منابع مشابه
How to Break EAP-MD5
We propose an efficient attack to recover the passwords, used to authenticate the peer by EAP-MD5, in the IEEE 802.1X network. First, we recover the length of the used password through a method called length recovery attack by on-line queries. Second, we crack the known length password using a rainbow table pre-computed with a fixed challenge, which can be done efficiently with great probabilit...
متن کاملHow should multicomponent supramolecular gels be characterised?
Low molecular weight gels, or supramolecular gels, are formed when small molecules self-assemble into fibrous structures. Above a critical concentration, the entanglement and cross-linking of these structures leads to the formation of a self-supporting gel. There are many examples where a single component is used to form such gels. There is however an ever-increasing interest in using multiple ...
متن کاملConstructing a large class of supertough graphs
For each odd r ≥ 3 and each n of the form 2kb(r + 2 − 2b) for k ≥ 1 and 1 ≤ b ≤ (r − 1)/2, the first author has constructed an r-regular r/2-tough graph on n vertices. In this paper, we provide an alternate and more advantageous construction. First, both our new construction and its proof are simpler. Second, we use an extension of the notion of graph inflations, as used in a construction given...
متن کاملHow does DNA break during chromosomal translocations?
Chromosomal translocations are one of the most common types of genetic rearrangements and are molecular signatures for many types of cancers. They are considered as primary causes for cancers, especially lymphoma and leukemia. Although many translocations have been reported in the last four decades, the mechanism by which chromosomes break during a translocation remains largely unknown. In this...
متن کاملExploiting Software How to Break Code
How does software break? How do attackers make software break on purpose? Why are firewalls, intrusion detection systems, and antivirus software not keeping out the bad guys? What tools can be used to break software? This book provides the answers. Exploiting Software is loaded with examples of real attacks, attack patterns, tools, and techniques used by bad guys to break software. If you want ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Physical Review Letters
سال: 2018
ISSN: 0031-9007,1079-7114
DOI: 10.1103/physrevlett.121.135501