Dictionary attack

Known as: Pre-computed dictionary attack, Dictionary attacks, Word lists 
In cryptanalysis and computer security, a dictionary attack is a technique for defeating a cipher or authentication mechanism by trying to determine… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2009
2009
This paper describes the novel network-based approach to a dictionary attack detection with the ability to recognize successful… (More)
  • table 1
  • figure 1
  • table 2
Is this relevant?
Highly Cited
2006
Highly Cited
2006
We present a dictionary attack that is based on keyboard acoustic emanations. We combine signal processing and efficient data… (More)
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • figure 5
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Human-memorable passwords are a mainstay of computer security. To decrease vulnerability of passwords to brute-force dictionary… (More)
  • figure 1
Is this relevant?
Highly Cited
2004
Highly Cited
2004
In commonplace textual password schemes, users choose passwords that are easy to recall. Since memorable passwords typically… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2002
Highly Cited
2002
The use of passwords is a major point of vulnerability in computer security, as passwords are often easy to guess by automated… (More)
  • figure 1
Is this relevant?
Highly Cited
2000
Highly Cited
2000
Password-based protocols for authenticated key exchange (AKE) are designed to work despite the use of passwords drawn from a… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
1997
Highly Cited
1997
Strong password methods verify even small passwords over a network without additional stored keys or certificates with the user… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
1997
Highly Cited
1997
Encrypted Key Exchange (EKE) [1, 2] allows two parties sharing a password to exchange authenticated information over an insecure… (More)
  • figure 1
  • figure 3
  • figure 4
  • figure 5
  • figure 6
Is this relevant?
Highly Cited
1993
Highly Cited
1993
The encrypted key exchange (EKE) protocol is augmented so that hosts do not store cleartext passwords. Consequently, adversaries… (More)
  • table 1
Is this relevant?
Highly Cited
1992
Highly Cited
1992
Classical cryptographic protocols based on user chosen keys allow an attacker to mount password guessing attacks We introduce a… (More)
Is this relevant?