Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,445,446 papers from all fields of science
Search
Sign In
Create Free Account
Dictionary attack
Known as:
Pre-computed dictionary attack
, Dictionary attacks
, Word lists
Expand
In cryptanalysis and computer security, a dictionary attack is a technique for defeating a cipher or authentication mechanism by trying to determine…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
49 relations
Anti-pharming
Anti-spam techniques
Application security
Brute-force attack
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2011
2011
FPGA based optimization for masked AES implementation
Zheng Yuan
,
Yi (Estelle) Wang
,
Jing Li
,
Renfa Li
,
Wei Zhao
Midwest Symposium on Circuits and Systems
2011
Corpus ID: 12468949
Masking methods are popularly used to defend against power analysis attacks in embedded systems. Apart from power analysis attack…
Expand
2008
2008
Mimicry Attacks Demystified: What Can Attackers Do to Evade Detection?
H. G. Kayacik
,
N. Zincir-Heywood
Sixth Annual Conference on Privacy, Security and…
2008
Corpus ID: 14442078
Mimicry attacks have been the focus of detector research where the objective of the attacker is to generate an attack that evades…
Expand
2007
2007
Enhanced Semantic Question Answering System for e-Learning Environment
Ying-Hong Wang
,
Wen-Nan Wang
,
Chu-Chi Huang
21st International Conference on Advanced…
2007
Corpus ID: 640922
To support an automatic assistant learning and self- paced learning mechanism is the objective in today's e-learning environment…
Expand
Highly Cited
2006
Highly Cited
2006
Is all that talk just noise
Jeremy Piger
2006
Corpus ID: 154694480
Views expressed do not necessarily reflect official positions of the Federal Reserve System. Announcements by the Federal Reserve…
Expand
Highly Cited
2005
Highly Cited
2005
Identifying Non-Referential it: A Machine Learning Approach Incorporating Linguistically Motivated Patterns
Adriane Boyd
,
Whitney Gegg-Harrison
,
D. Byron
Annual Meeting of the Association for…
2005
Corpus ID: 7045889
In this paper, we present a machine learning system for identifying non-referential it. Types of non-referential it are examined…
Expand
Highly Cited
2002
Highly Cited
2002
Personality and Memory in Old Age
B. Meier
,
P. Perrig-Chiello
,
W. Perrig
2002
Corpus ID: 49581507
We examined the impact of personality on episodic memory performance in a sample of 287 healthy adults aged 68-95 years…
Expand
Highly Cited
2002
Highly Cited
2002
Digital image-in-image watermarking for copyright protection of satellite images using the fast Hadamard transform
A. Ho
,
Junwei Shen
,
S. Tan
,
A. Kot
IEEE International Geoscience and Remote Sensing…
2002
Corpus ID: 6613529
In this paper, a robust and efficient digital image watermarking algorithm using the fast Hadamard transform (FFIT) is proposed…
Expand
1993
1993
The Use of Machine Readable Dictionaries in the Pangloss Project
Stephen Helmreich
,
Louise Guthrie
,
Y. Wilks
1993
Corpus ID: 17347093
Machine Readable Dictionaries (MRDs) contain much useful information about lan£uage. Researchers have worked for the last decade…
Expand
Review
1989
Review
1989
Wordsurv : a program for analyzing language survey word lists
J. Wimbish
1989
Corpus ID: 57044838
Highly Cited
1976
Highly Cited
1976
Coding modality vs. input modality in hypermnesia: Is a rose a rose a rose?
M. Erdelyi
,
Shira Finkelstein
,
Nadeanne Herrel
,
Bruce Miller
,
Jane Thomas
Cognition
1976
Corpus ID: 53163196
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE