This is a whitepaper that discusses using Compute Unified Device Architecture (CUDA) GPU cracking to crack passwords.
88b5b63ab5a021be6ede8b93b7d52a17
Whitepaper discussing information leakage and password extraction from a BIOS.
484b3c11908948f9c7311f87b66bf5e1
Password article that discusses common attacks and possible solutions.
178ad30a02340076118e78e5635f87d7
Paper written about the art of brute force cracking that comes with example code.
97b6bcfd74b5fe9ce55a5aa8cf7f0e8c
Department of Defense Password Management Guideline: Enumerates a number of good password management practices
35c256b895bd29c27123833e43386a56
Standard for Automated Password Generator: Federal Information Processing Standard No 181
0ad16ceab5c5acc0451a1d730b6cbdd1
Foiling the Cracker: A Survey of, and Improvements to, Password Security: Demonstrates the ease with which most passwords can be guessed by a motivated attacker
d4ec4e1eb00620466cf41ac2973da126
Observing Reusable Password Choices: A method for observing password choices made by users, and how to protect it from being compromised
0bf911f81dc86a4d7e1cae890e3664ee
OPUS: Preventing Weak Password Choices. A system that uses Bloom filters to implement a constant-time dictionary lookup, regardless of dictionary size, to check a user's password choice for " goodness"
b478c75bd2448446dfe48dcb6ae7254d
User Authentication and Related Topics: An Annotated Bibliography
f06034f3296f337407bb218d2af952c0
Password Security: A Case History: A description of the original UNIX password algorithm, and the reasons for replacing it with the current one
4b0c98ae2cc80812a1b4df0a69678dac
UNIX Password Security - Ten Years Later: A reexamination of the UNIX password algorithm after ten years of advances in software and hardware
add317fd31b7e8dcbfdbbcd011023202
The S/Key One-Time Password System: A freely available implementation of one-time passwords
ee1f52a1d51c28c229b9a49b08dadff2