Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Dictionary attack

Known as: Pre-computed dictionary attack, Dictionary attacks, Word lists 
In cryptanalysis and computer security, a dictionary attack is a technique for defeating a cipher or authentication mechanism by trying to determine… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2014
Highly Cited
2014
This paper describes Meteor Universal, released for the 2014 ACL Workshop on Statistical Machine Translation. Meteor Universal… Expand
  • table 1
  • table 2
  • table 3
Is this relevant?
Highly Cited
2006
Highly Cited
2006
We present a dictionary attack that is based on keyboard acoustic emanations. We combine signal processing and efficient data… Expand
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • figure 5
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Human-memorable passwords are a mainstay of computer security. To decrease vulnerability of passwords to brute-force dictionary… Expand
  • figure 1
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Models for many natural language tasks benefit from the flexibility to use overlapping, non-independent features. For example… Expand
  • figure 1
Is this relevant?
Highly Cited
2002
Highly Cited
2002
The use of passwords is a major point of vulnerability in computer security, as passwords are often easy to guess by automated… Expand
Is this relevant?
Highly Cited
2000
Highly Cited
2000
Password-based protocols for authenticated key exchange (AKE) are designed to work despite the use of passwords drawn from a… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
1993
Highly Cited
1993
The encrypted key exchange (EKE) protocol is augmented so that hosts do not store cleartext passwords. Consequently, adversaries… Expand
  • table 1
Is this relevant?
Highly Cited
1992
Highly Cited
1992
Classic cryptographic protocols based on user-chosen keys allow an attacker to mount password-guessing attacks. A combination of… Expand
Is this relevant?
Highly Cited
1991
Highly Cited
1991
Dual coding theory (DCT) explains human behavior and experience in terms of dynamic associative processes that operate on a rich… Expand
  • figure 1
Is this relevant?
Highly Cited
1991
Highly Cited
1991
Part 1 An empirical approach to language teaching methodology: defining "methodology" research into language processing and… Expand
Is this relevant?