How we deciphered millions of users’ encrypted passwords without the decryption keys.
Is Pavlovian Password Management The Answer?
DoCatsLikeLemon? – Advanced phrase attacks and analysis
Tradeoff cryptanalysis of password hashing schemes
Using cryptanalysis to speed-up password cracking
Password Security in the PCI DSS
Defense with 2FA
I have the #cat so I make the rules
Penetrate your OWA
All your SAP P@$$w0ЯdZ belong to us
Target specific automated dictionary generation
Bitslice DES with LOP3.LUT
Net hashes: a review of many network protocols
Energy-efficient bcrypt cracking
The problem with the real world
Password Topology Histogram Wear-Leveling, a.k.a. PathWell
Beam Me Up Scotty! – Passwords in the Enterprise