An Explainable Online Password Strength Estimator
暂无分享,去创建一个
[1] Dakshi Agrawal,et al. The EM Side-Channel(s) , 2002, CHES.
[2] Lujo Bauer,et al. Encountering stronger password requirements: user attitudes and behaviors , 2010, SOUPS.
[3] Claude Castelluccia,et al. OMEN: Faster Password Guessing Using an Ordered Markov Enumerator , 2015, ESSoS.
[4] François-Xavier Standaert,et al. An optimal Key Enumeration Algorithm and its Application to Side-Channel Attacks , 2012, IACR Cryptol. ePrint Arch..
[5] Vitaly Shmatikov,et al. Fast dictionary attacks on passwords using time-space tradeoff , 2005, CCS '05.
[6] Maurizio Filippone,et al. Monte Carlo Strength Evaluation: Fast and Reliable Password Checking , 2015, CCS.
[7] Julie Thorpe,et al. On Semantic Patterns of Passwords and their Security Impact , 2014, NDSS.
[8] Fernando Pérez-Cruz,et al. PassGAN: A Deep Learning Approach for Password Guessing , 2017, ACNS.
[9] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[10] Ping Wang,et al. Targeted Online Password Guessing: An Underestimated Threat , 2016, CCS.
[11] Paul C. Kocher,et al. Differential Power Analysis , 1999, CRYPTO.
[12] Avishai Wool,et al. A Bounded-Space Near-Optimal Key Enumeration Algorithm for Multi-subkey Side-Channel Attacks , 2017, CT-RSA.
[13] Yue Li,et al. Personal Information in Passwords and Its Security Implications , 2017, IEEE Transactions on Information Forensics and Security.
[14] Romain Poussier,et al. Simpler and More Efficient Rank Estimation for Side-Channel Security Assessment , 2015, FSE.
[15] Romain Poussier,et al. Simple Key Enumeration (and Rank Estimation) Using Histograms: An Integrated Approach , 2016, CHES.
[16] Sudhir Aggarwal,et al. Testing metrics for password creation policies by attacking large sets of revealed passwords , 2010, CCS '10.
[17] Elisabeth Oswald,et al. Counting Keys in Parallel After a Side Channel Attack , 2015, ASIACRYPT.
[18] Elisabeth Oswald,et al. Two Sides of the Same Coin: Counting and Enumerating Keys Post Side-Channel Attacks Revisited , 2018, IACR Cryptol. ePrint Arch..
[19] Zhenfeng Zhang,et al. LPSE: Lightweight password-strength estimation for password meters , 2018, Comput. Secur..
[20] Nikita Borisov,et al. The Tangled Web of Password Reuse , 2014, NDSS.
[21] Blase Ur,et al. Design and Evaluation of a Data-Driven Password Meter , 2017, CHI.
[22] Francis Olivier,et al. Electromagnetic Analysis: Concrete Results , 2001, CHES.
[23] Sudhir Aggarwal,et al. Using Personal Information in Targeted Grammar-Based Probabilistic Password Attacks , 2017, IFIP Int. Conf. Digital Forensics.
[24] Avishai Wool,et al. Poly-Logarithmic Side Channel Rank Estimation via Exponential Sampling , 2019, IACR Cryptol. ePrint Arch..
[25] Jean-Jacques Quisquater,et al. ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards , 2001, E-smart.
[26] Andrey Bogdanov,et al. Fast and Memory-Efficient Key Recovery in Side-Channel Attacks , 2015, SAC.