Rainbow table

Known as: Thunder table, Rainbow attack, Reduction function 
A rainbow table is a precomputed table for reversing cryptographic hash functions, usually for cracking password hashes. Tables are usually used in… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

2005-2017
051020052017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Cryptanalytic time-memory tradeoffs were introduced by Martin Hellman in 1980 to perform key-recovery attacks on cryptosystems… (More)
  • figure 1
  • table 1
  • table 2
  • table 3
  • table 4
Is this relevant?
2013
2013
Rainbow tables are basically huge tables filled with hash values and are used to find required password. Rainbow Table is used by… (More)
Is this relevant?
2013
2013
Encryption algorithms utilized in mobile communication systems have been under attack since their introduction, and many of these… (More)
  • table 4
Is this relevant?
2013
2013
Cryptography has become an essential for providing security in embedded system applications. The employed cryptographic… (More)
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2012
2012
As users become increasingly aware of the need to adopt strong password, it brings challenges to digital forensics investigators… (More)
Is this relevant?
2012
2012
A5 is the basic cryptographic algorithm used in GSM cell-phones to ensure that the user communication is protected against… (More)
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2010
2010
Since 1998 the GSM security has been academically broken but no real attack has ever been done until in 2008 when two engineers… (More)
Is this relevant?
2010
2010
One of the most efficient methods for cracking passwords, which are hashed based on different cryptographic algorithms, is the… (More)
Is this relevant?
2008
2008
Cryptanalytic time-memory trade-offs have been studied for 25 years and have benefited from several improvements since the… (More)
  • table I
  • table II
  • table III
  • figure 2
  • figure 3
Is this relevant?
2006
2006
In this paper, we present the rainbow attack on stream ciphers filtered by Maiorana-McFarland functions. This can be considered… (More)
  • table 1
  • table 2
Is this relevant?