2018
DOI: 10.1016/j.future.2018.02.018
|View full text |Cite
|
Sign up to set email alerts
|

Mimic computing for password recovery

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 31 publications
0
4
0
Order By: Relevance
“…To determine the appropriate threshold, we considered the password cracking speeds achievable by contemporary computers. In a recent study, [27] reported MD5 hash cracking speeds of up to 16 GH/s using their high-order reconfigurable processing unit. A benchmark test employing a rig of 8 nVidia GTX 1080 Ti GPUs achieved over 307 GH/s for MD5 hashed passwords [17].…”
Section: Methodsmentioning
confidence: 99%
“…To determine the appropriate threshold, we considered the password cracking speeds achievable by contemporary computers. In a recent study, [27] reported MD5 hash cracking speeds of up to 16 GH/s using their high-order reconfigurable processing unit. A benchmark test employing a rig of 8 nVidia GTX 1080 Ti GPUs achieved over 307 GH/s for MD5 hashed passwords [17].…”
Section: Methodsmentioning
confidence: 99%
“…Mimic computing breaks through the traditional concept of FPGA reconstruction and has been comprehensively expanded in the dimensions of reconstruction granularity, timing breadth, fitness depth, and initiative. Logic gates, logic blocks, IP cores, and components that have been extended to subsystems are all multidimensional reconstruction components [15]. HRCA, as the key technology of mimic computing, introduces the concept of computing granulation based on time and space, that is, the time space granularity (TSG) structure, as shown in Fig.1.…”
Section: Related Work a Hrca Overviewmentioning
confidence: 99%
“…Web Server [11] Router [12] Network Operating System [13] DNS [14] Password recovery [15] Industry Control System [16] As shown in Table 1, the mimic defense technology based on DHR architecture technology has been applied in many fields.…”
Section: Applicationsmentioning
confidence: 99%