Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

RainbowCrack

Known as: Rainbow Crack 
RainbowCrack is a computer program which generates rainbow tables to be used in password cracking. RainbowCrack differs from "conventional" brute… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
  • E. V. Maliberan
  • Int. J. Commun. Networks Inf. Secur.
  • 2019
  • Corpus ID: 146807302
The modified SHA1 algorithm has been developed by expanding its hash value up to 1280 bits from the original size of 160 bit… Expand
  • table 1
  • table 3
  • table 2
  • figure 2
  • figure 5
2019
2019
Researchers and experts had developed numerous hash-based password authentication schemes. Inappropriately, most of them are… Expand
  • figure 2
  • figure 1
  • table I
  • figure 5
  • figure 6
2018
2018
The enhanced MD5 algorithm has been developed by expanding its hash value up to 1280 bits from the original size of 128 bit using… Expand
  • figure 1
  • table 2
  • figure 4
  • figure 5
  • figure 2
Review
2018
Review
2018
Now a days ,almost all generations are using technology. Every and other person is active on social media like Facebook, twitter… Expand
2015
2015
Rainbow table is one of the techniques to crack passwords from hash values by precomputation table. However, password cracking… Expand
  • table I
  • table III
  • table VIII
  • table IV
  • table VI
2015
2015
The computing power of graphics processing units (GPU) has increased rapidly, and there has been extensive research on general… Expand
2014
2014
Abstract Nearly three decades ago, Martin Hellman introduced a cryptanalytic time-memory trade-off algorithm which reduced the… Expand
  • figure 2
  • figure 3
  • figure 4
  • table 1
  • figure 5
2013
2013
The computing power of graphics processing units (GPU) has increased rapidly, and there has been extensive research on general… Expand
  • figure 1.1
  • table 1.1
  • figure 2.1
  • figure 2.2
  • figure 2.3
2011
2011
Due to the parallel nature of brute force attack, it is well suited to use parallel or distributed computing to recover passwords… Expand
  • figure 1
  • figure 2
  • table 2
2010
2010
Chapters: Password Cracking, Dsniff, John the Ripper, Cain and Abel, Saminside, L0phtcrack, Ophcrack, Lastbit, Rainbowcrack… Expand