Ataque de força bruta: diferenças entre revisões

Conteúdo apagado Conteúdo adicionado
Criado ao traduzir a página "Brute-force attack"
Arrumando referências e colocando categoria.
Linha 67:
 
== Notes ==
# [[Brute-force attack#harv|Paar 2010]], p. 7.
{{Reflist}}
# [[Brute-force attack#CITEREFLandauer1961|Landauer 1961]], p. 183-191.
# [[Brute-force attack#CITEREFGraham2011|Graham 2011]].
# [[Brute-force attack#CITEREFKingsley-Hughes2008|Kingsley-Hughes 2008]].
# [[Brute-force attack#CITEREFKamerling2007|Kamerling 2007]].
# [[Brute-force attack#harv|Viega 2002]], p. 18.
# [[Brute-force attack#CITEREFCERT-2008|CERT-2008]].
# [[Brute-force attack#CITEREFEllis|Ellis]].
# [[Brute-force attack#CITEREFNSA-2009|NSA-2009]].
# [[Brute-force attack#CITEREFReynard1997|Reynard 1997]], p. 86.
# [[Brute-force attack#harv|Burnett 2004]].
# [[Brute-force attack#CITEREFRistic2010|Ristic 2010]], p. 136.
# http://www.infosecpro.com/applicationsecurity/a11.htm
 
== Referências ==
Linha 76 ⟶ 88:
* [http://codebook.org/codebook_solution.pdf How We Cracked the Code Book Ciphers] – Essay by the winning team of the challenge in The Code Book
* [http://security.stackexchange.com/questions/25375/why-not-use-larger-cipher-keys Why not use larger cipher keys?]
[[Categoria:Criptografia]]