Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 223,832,526 papers from all fields of science
Search
Sign In
Create Free Account
Rainbow table
Known as:
Thunder table
, Rainbow attack
, Rainbow (disambiguation)
Expand
A rainbow table is a precomputed table for reversing cryptographic hash functions, usually for cracking password hashes. Tables are usually used in…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
37 relations
Authentication
Bcrypt
Brute-force attack
Common Scrambling Algorithm
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Add "Salt" MD5 Algorithm’s FPGA Implementation
Ye Tian
,
Kun Zhang
,
Pu Wang
,
Yuming Zhang
,
Jun Yang
2018
Corpus ID: 56800557
2018
2018
Towards a library of formalised undecidable problems in Coq: The undecidability of intuitionistic linear logic
Y. Forster
2018
Corpus ID: 55861076
The undecidability of low-level problems like the halting problem is usually shown by deriving a logical contradiction from the…
Expand
2017
2017
An optimized I-F startup method for BEMF-based sensorless control of SPMSM
Minghui Wang
,
Yongxiang Xu
,
J. Zou
,
H. Lan
IEEE Transportation Electrification Conference…
2017
Corpus ID: 39207234
BEMF-based methods, with the purpose of estimating the position and speed of the permanent magnet synchronous machine (PMSM…
Expand
2017
2017
Vibration Antiresonance Design for a Spacecraft Multifunctional Structure
Dong-Xu Li
,
Wang Liu
,
Dong Hao
2017
Corpus ID: 55439767
Spacecraft must withstand rigorous mechanical environment experiences such as acceleration, noise, vibration, and shock during…
Expand
2014
2014
Maize response to water, salinity and nitrogen levels: yield-water relation, water-use efficiency and water uptake reduction function
A. Azizian
,
A. Sepaskhah
2014
Corpus ID: 55923669
Water, salinity and nitrogen are the major factors affecting maize production in arid and semi-arid areas. The objectives of this…
Expand
2009
2009
The use of difference spectra with a filtered rolling average background in mobile gamma spectrometry measurements
A. Cresswell
,
D. Sanderson
2009
Corpus ID: 27136111
2009
2009
Choosing Parameters to Achieve a Higher Success Rate for Hellman Time Memory Trade Off Attack
N. Saran
,
A. Doganaksoy
ARES
2009
Corpus ID: 11918883
In 1980, Hellman proposed the Time Memory Trade Off (TMTO) attack and applied it on block cipher DES (Data Encryption Standard…
Expand
2002
2002
A cross-correlation technique in wavelet domain for detection of stochastic gravitational waves
S. Klimenko
,
G. Mitselmakher
,
A. Sazonov
2002
Corpus ID: 18432605
Stochastic gravitational waves (SGW) can be detected by measuring a cross-correlation of two or more gravitational wave (GW…
Expand
2000
2000
A Quasi-Coherent Sampling Method for Wideband Data Acquisition
M. Kimura
,
Kensuke Kobayashi
,
Haruo Kobayashi
56th ARFTG Conference Digest
2000
Corpus ID: 27105621
This paper proposes a quasi-coherent equivalent-time sampling method to acquire repetitive wideband waveform signals with high…
Expand
1987
1987
Bisimulations for concurrency
I. Castellani
1987
Corpus ID: 56985452
We study three notions of bisimulation equivalence for concurrent processes. Bisimulation equivalences are based on an…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE