Author of the publication

Unrevealed Patterns in Password Databases Part One: Analyses of Cleartext Passwords.

, , , and . PASSWORDS, volume 9393 of Lecture Notes in Computer Science, page 89-101. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

D(HE)at: A Practical Denial-of-Service Attack on the Finite Field Diffie-Hellman Key Exchange., and . IEEE Access, (2024)Privacy-Preserving Password Cracking: How a Third Party Can Crack Our Password Hash Without Learning the Hash Value or the Cleartext., , , and . IEEE Trans. Inf. Forensics Secur., (2024)Fast Method for Locating Peak Values of the Riemann Zeta Function on the Critical Line.. SYNASC, page 91-96. IEEE Computer Society, (2014)A New Era in Software Security: Towards Self-Healing Software via Large Language Models and Formal Verification., , , , , and . CoRR, (2023)SecureFalcon: The Next Cyber Reasoning System for Cyber Security., , , , , and . CoRR, (2023)A Pseudorandom number Generator with Full Cycle Length based on Automata Compositions., , , , , and . Informatica (Slovenia), (2021)Computation Results of the Riemann Zeta Search Project., and . SYNASC, page 75-79. IEEE, (2018)Unrevealed Patterns in Password Databases Part One: Analyses of Cleartext Passwords., , , and . PASSWORDS, volume 9393 of Lecture Notes in Computer Science, page 89-101. Springer, (2014)A Full Cycle Length Pseudorandom Number Generator Based on Compositions of Automata., , , , , and . Informatica (Slovenia), (2021)Privacy-Preserving Password Cracking: How a Third Party Can Crack Our Password Hash Without Learning the Hash Value or the Cleartext., , , and . CoRR, (2023)