scispace - formally typeset
Search or ask a question
Topic

Rainbow table

About: Rainbow table is a research topic. Over the lifetime, 488 publications have been published within this topic receiving 11528 citations.


Papers
More filters
Proceedings ArticleDOI
31 Oct 2008
TL;DR: A hash table data structure that stores string signatures in an array that supports faster element testing than a bloom filter and requires less memory than a standard hash table that uses linked-list chains.
Abstract: Bloom filters are a well known data structure for approximate set membership. Bloom filters are space efficient but require many independent hashes and consecutive memory accesses for an element test. In this paper, we develop a hash table data structure that stores string signatures in an array. This new signature array hash table (SAHT) supports faster element testing than a bloom filter and requires less memory than a standard hash table that uses linked-list chains. The SAHT also supports removal of elements (which a Bloom filter does not) and addition of elements at the expense of requiring about 1.5x more memory than a bloom filter with same false positive rate.

3 citations

Journal ArticleDOI
TL;DR: This paper shows that the space for the 3-D password space is reduced and increase the security.
Abstract: D password is a multifactor authentication scheme. For the authentication, it is require to presents a 3-D virtual environment where the user navigates and interacts with various objects. The sequence of actions and interactions toward the objects inside the 3-D environment constructs the user's 3-D password. The 3-D password can combine most existing authentication schemes such as textual passwords, graphical passwords, and various types of biometrics into a 3- D virtual environment. The design of the 3-D virtual environment and the type of objects selected determine the 3- D password key space. As per the reference(1) the author tells that the resulting 3D password space is very huge. In this paper we shows that the space is reduced and increase the security.

3 citations

Journal ArticleDOI
TL;DR: The password required for authentication of members of group communication is securely delivered by the source or initiator of the group using zero knowledge proof and sent to the group member in an encrypted format using cipher block mode encryption.
Abstract: The password which is a more secure and valuable data should be highly protected from eavesdropper. This paper presents how password required for authentication of members of group communication is securely delivered by the source or initiator of the group. The password delivery uses zero knowledge proof and sent to the group member in an encrypted format using cipher block mode encryption. The password delivered is a One Time Password which can be used for certain amount of time in order to ensure a highly secure communication environment among the group.

3 citations

Patent
24 Feb 2016
TL;DR: In this paper, a color management unit has a hash table to store input colors and corresponding output colors and a lookup table (LUT) and one or more processors to reinitialize the hash table based on hash table time and a interpolation time derived from concurrent real-time measurements.
Abstract: A printing system is disclosed. The printing system includes a color management unit having a hash table to store input colors and corresponding output colors and a lookup table (LUT). The printing system also includes one or more processors to reinitialize the hash table based on a hash table time and a interpolation time derived from concurrent real time measurements.

3 citations

Proceedings ArticleDOI
06 Feb 1989
TL;DR: A password authentication mechanism based on the public-key distribution cryptosystem is proposed, which uses an authentication table to replace the traditional password file.
Abstract: A password authentication mechanism based on the public-key distribution cryptosystem is proposed. The scheme uses an authentication table to replace the traditional password file. With this scheme, even if the authentication table is comprised, the system security is preserved. The user's password is effectively bound to the user's identification in a timely, efficient, and simple manner. >

3 citations


Network Information
Related Topics (5)
Cryptography
37.3K papers, 854.5K citations
84% related
Encryption
98.3K papers, 1.4M citations
82% related
Public-key cryptography
27.2K papers, 547.7K citations
82% related
Authentication
74.7K papers, 867.1K citations
79% related
Key (cryptography)
60.1K papers, 659.3K citations
79% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20215
20206
201911
201810
201729
201630