ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2006.05023
  4. Cited By
On the Economics of Offline Password Cracking

On the Economics of Offline Password Cracking

9 June 2020
Jeremiah Blocki
B. Harsha
Samson Zhou
ArXiv (abs)PDFHTML

Papers citing "On the Economics of Offline Password Cracking"

22 / 22 papers shown
Title
Evaluating Argon2 Adoption and Effectiveness in Real-World Software
Evaluating Argon2 Adoption and Effectiveness in Real-World Software
Pascal Tippe
Michael P. Berner
40
0
0
23 Apr 2025
Conditional Encryption with Applications to Secure Personalized Password
  Typo Correction
Conditional Encryption with Applications to Secure Personalized Password Typo Correction
Mohammad Hassan Ameri
Jeremiah Blocki
65
0
0
10 Sep 2024
Protecting Onion Service Users Against Phishing
Protecting Onion Service Users Against Phishing
Benjamin Güldenring
Volker Roth
32
0
0
14 Aug 2024
SoK: Web Authentication in the Age of End-to-End Encryption
SoK: Web Authentication in the Age of End-to-End Encryption
Jenny Blessing
Daniel Hugenroth
Ross J. Anderson
A. Beresford
81
1
0
26 Jun 2024
PassGPT: Password Modeling and (Guided) Generation with Large Language
  Models
PassGPT: Password Modeling and (Guided) Generation with Large Language Models
Javier Rando
Fernando Perez-Cruz
Briland Hitaj
GAN
54
10
0
02 Jun 2023
Universal Neural-Cracking-Machines: Self-Configurable Password Models
  from Auxiliary Data
Universal Neural-Cracking-Machines: Self-Configurable Password Models from Auxiliary Data
Dario Pasquini
G. Ateniese
Carmela Troncoso
FedML
51
4
0
18 Jan 2023
Cost-Asymmetric Memory Hard Password Hashing
Cost-Asymmetric Memory Hard Password Hashing
Wenjie Bai
Jeremiah Blocki
Mohammad Hassan Ameri
OffRL
26
3
0
26 Jun 2022
Zero-Knowledge Authentication
Zero-Knowledge Authentication
Jakob Povsic
A. Brodnik
18
0
0
12 May 2022
Towards a Rigorous Statistical Analysis of Empirical Password Datasets
Towards a Rigorous Statistical Analysis of Empirical Password Datasets
Jeremiah Blocki
Peiyuan Liu
35
3
0
29 May 2021
DAHash: Distribution Aware Tuning of Password Hashing Costs
DAHash: Distribution Aware Tuning of Password Hashing Costs
Wenjie Bai
Jeremiah Blocki
42
7
0
25 Jan 2021
Reducing Bias in Modeling Real-world Password Strength via Deep Learning
  and Dynamic Dictionaries
Reducing Bias in Modeling Real-world Password Strength via Deep Learning and Dynamic Dictionaries
Dario Pasquini
Marco Cianfriglia
G. Ateniese
M. Bernaschi
AAML
99
34
0
23 Oct 2020
Password Strength Signaling: A Counter-Intuitive Defense Against
  Password Cracking
Password Strength Signaling: A Counter-Intuitive Defense Against Password Cracking
Wenjie Bai
Jeremiah Blocki
B. Harsha
16
1
0
21 Sep 2020
Skeptic: Automatic, Justified and Privacy-Preserving Password
  Composition Policy Selection
Skeptic: Automatic, Justified and Privacy-Preserving Password Composition Policy Selection
S. A. Johnson
J. Ferreira
A. Mendes
Julien Cordry
27
13
0
07 Jul 2020
DALock: Distribution Aware Password Throttling
DALock: Distribution Aware Password Throttling
Jeremiah Blocki
Wuwei Zhang
29
5
0
18 May 2020
Practical Hash-based Anonymity for MAC Addresses
Practical Hash-based Anonymity for MAC Addresses
Junade Ali
Vladimir Dyo
18
9
0
13 May 2020
An Economic Model for Quantum Key-Recovery Attacks against Ideal Ciphers
An Economic Model for Quantum Key-Recovery Attacks against Ideal Ciphers
B. Harsha
Jeremiah Blocki
16
1
0
12 May 2020
Bicycle Attacks Considered Harmful: Quantifying the Damage of Widespread
  Password Length Leakage
Bicycle Attacks Considered Harmful: Quantifying the Damage of Widespread Password Length Leakage
B. Harsha
Robert Morton
Jeremiah Blocki
John A. Springer
M. Dark
32
8
0
04 Feb 2020
Detecting stuffing of a user's credentials at her own accounts
Detecting stuffing of a user's credentials at her own accounts
K. Wang
Michael K. Reiter
99
23
0
23 Dec 2019
Computationally Data-Independent Memory Hard Functions
Computationally Data-Independent Memory Hard Functions
Mohammad Hassan Ameri
Jeremiah Blocki
Samson Zhou
13
4
0
15 Nov 2019
Differentially private anonymized histograms
Differentially private anonymized histograms
A. Suresh
PICV
85
23
0
08 Oct 2019
Why Botnets Work: Distributed Brute-Force Attacks Need No
  Synchronization
Why Botnets Work: Distributed Brute-Force Attacks Need No Synchronization
Salman Salamatian
Wasim Huleihel
Ahmad Beirami
A. Cohen
Muriel Médard
13
42
0
29 May 2018
Sustained Space Complexity
Sustained Space Complexity
J. Alwen
Jeremiah Blocki
Krzysztof Pietrzak
47
40
0
15 May 2017
1