Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 205,169,693 papers from all fields of science
Search
Sign In
Create Free Account
RainbowCrack
Known as:
Rainbow Crack
RainbowCrack is a computer program which generates rainbow tables to be used in password cracking. RainbowCrack differs from "conventional" brute…
Expand
Wikipedia
Create Alert
Alert
Related topics
Related topics
9 relations
Brute-force attack
Cain and Abel
Crack
Cryptanalysis
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Modified SHA1: A Hashing Solution to Secure Web Applications through Login Authentication
E. V. Maliberan
Int. J. Commun. Networks Inf. Secur.
2019
Corpus ID: 146807302
The modified SHA1 algorithm has been developed by expanding its hash value up to 1280 bits from the original size of 160 bit…
Expand
2019
2019
Cryptanalysis on the Head and Tail Technique for Hashing Passwords
Michael Angelo D. Brogada
,
Ariel M. Sison
,
Ruji P. Medina
IEEE 7th Conference on Systems, Process and…
2019
Corpus ID: 215817800
Researchers and experts had developed numerous hash-based password authentication schemes. Inappropriately, most of them are…
Expand
Review
2018
Review
2018
A Review on Maintaining Web Applications and Brute Force Attack
Gauri Marne
,
R. Ingole
2018
Corpus ID: 64803715
Now a days ,almost all generations are using technology. Every and other person is active on social media like Facebook, twitter…
Expand
2018
2018
A New Approach in Expanding the Hash Size of MD5
E. V. Maliberan
,
Ariel M. Sison
,
Ruji P. Medina
Int. J. Commun. Networks Inf. Secur.
2018
Corpus ID: 52069127
The enhanced MD5 algorithm has been developed by expanding its hash value up to 1280 bits from the original size of 128 bit using…
Expand
2015
2015
Improved GPU Implementation of RainbowCrack
Yukitoki Tabata
,
K. Iwai
,
Hidema Tanaka
,
T. Kurokawa
Third International Symposium on Computing and…
2015
Corpus ID: 2901961
Rainbow table is one of the techniques to crack passwords from hash values by precomputation table. However, password cracking…
Expand
2015
2015
High‐speed parallel implementations of the rainbow method based on perfect tables in a heterogeneous system
Jung Woo Kim
,
Jungjoo Seo
,
Jin Hong
,
Kunsoo Park
,
Sung-Ryul Kim
Softw. Pract. Exp.
2015
Corpus ID: 17274892
The computing power of graphics processing units (GPU) has increased rapidly, and there has been extensive research on general…
Expand
2015
2015
Improvement of RainbowCrack Reduction Function
Tabata Yuki
,
Iwai Keisuke
,
Tanaka Hidema
,
Kurokawa Takakazu
2015
Corpus ID: 155618977
2014
2014
An improved parallel implementation of RainbowCrack using MPI
E. Sykes
,
Wesley Skoczen
J. Comput. Sci.
2014
Corpus ID: 9853441
2011
2011
A universal distributed model for password cracking
Jing Zou
,
D. Lin
,
Guo-Cui Mi
International Conference on Machine Learning and…
2011
Corpus ID: 12550610
Due to the parallel nature of brute force attack, it is well suited to use parallel or distributed computing to recover passwords…
Expand
2010
2010
Password Cracking Software: Password Cracking, Dsniff, John the Ripper, Cain and Abel, Saminside, L0phtcrack, Ophcrack, Lastbit, Rainbowcrack
Books Llc
2010
Corpus ID: 59993367
Chapters: Password Cracking, Dsniff, John the Ripper, Cain and Abel, Saminside, L0phtcrack, Ophcrack, Lastbit, Rainbowcrack…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
,
Terms of Service
, and
Dataset License
ACCEPT & CONTINUE