Find link
language:
af: Afrikaans
als: Alemannisch
[Alemannic]
am: አማርኛ
[Amharic]
an: aragonés
[Aragonese]
ar: العربية
[Arabic]
arz: مصرى
[Egyptian Arabic]
as: অসমীয়া
[Assamese]
ast: asturianu
[Asturian]
az: azərbaycanca
[Azerbaijani]
azb: تۆرکجه
[Southern Azerbaijani]
ba: башҡортса
[Bashkir]
bar: Boarisch
[Bavarian]
bat-smg: žemaitėška
[Samogitian]
be: беларуская
[Belarusian]
be-tarask: беларуская (тарашкевіца)
[Belarusian (Taraškievica)]
bg: български
[Bulgarian]
bn: বাংলা
[Bengali]
bpy: বিষ্ণুপ্রিয়া মণিপুরী
[Bishnupriya Manipuri]
br: brezhoneg
[Breton]
bs: bosanski
[Bosnian]
bug: ᨅᨔ ᨕᨘᨁᨗ
[Buginese]
ca: català
[Catalan]
ce: нохчийн
[Chechen]
ceb: Cebuano
ckb: کوردیی ناوەندی
[Kurdish (Sorani)]
cs: čeština
[Czech]
cv: Чӑвашла
[Chuvash]
cy: Cymraeg
[Welsh]
da: dansk
[Danish]
de: Deutsch
[German]
el: Ελληνικά
[Greek]
en: English
eo: Esperanto
es: español
[Spanish]
et: eesti
[Estonian]
eu: euskara
[Basque]
fa: فارسی
[Persian]
fi: suomi
[Finnish]
fo: føroyskt
[Faroese]
fr: français
[French]
fy: Frysk
[West Frisian]
ga: Gaeilge
[Irish]
gd: Gàidhlig
[Scottish Gaelic]
gl: galego
[Galician]
gu: ગુજરાતી
[Gujarati]
he: עברית
[Hebrew]
hi: हिन्दी
[Hindi]
hr: hrvatski
[Croatian]
hsb: hornjoserbsce
[Upper Sorbian]
ht: Kreyòl ayisyen
[Haitian]
hu: magyar
[Hungarian]
hy: Հայերեն
[Armenian]
ia: interlingua
[Interlingua]
id: Bahasa Indonesia
[Indonesian]
io: Ido
is: íslenska
[Icelandic]
it: italiano
[Italian]
ja: 日本語
[Japanese]
jv: Basa Jawa
[Javanese]
ka: ქართული
[Georgian]
kk: қазақша
[Kazakh]
kn: ಕನ್ನಡ
[Kannada]
ko: 한국어
[Korean]
ku: Kurdî
[Kurdish (Kurmanji)]
ky: Кыргызча
[Kirghiz]
la: Latina
[Latin]
lb: Lëtzebuergesch
[Luxembourgish]
li: Limburgs
[Limburgish]
lmo: lumbaart
[Lombard]
lt: lietuvių
[Lithuanian]
lv: latviešu
[Latvian]
map-bms: Basa Banyumasan
[Banyumasan]
mg: Malagasy
min: Baso Minangkabau
[Minangkabau]
mk: македонски
[Macedonian]
ml: മലയാളം
[Malayalam]
mn: монгол
[Mongolian]
mr: मराठी
[Marathi]
mrj: кырык мары
[Hill Mari]
ms: Bahasa Melayu
[Malay]
my: မြန်မာဘာသာ
[Burmese]
mzn: مازِرونی
[Mazandarani]
nah: Nāhuatl
[Nahuatl]
nap: Napulitano
[Neapolitan]
nds: Plattdüütsch
[Low Saxon]
ne: नेपाली
[Nepali]
new: नेपाल भाषा
[Newar]
nl: Nederlands
[Dutch]
nn: norsk nynorsk
[Norwegian (Nynorsk)]
no: norsk bokmål
[Norwegian (Bokmål)]
oc: occitan
[Occitan]
or: ଓଡ଼ିଆ
[Oriya]
os: Ирон
[Ossetian]
pa: ਪੰਜਾਬੀ
[Eastern Punjabi]
pl: polski
[Polish]
pms: Piemontèis
[Piedmontese]
pnb: پنجابی
[Western Punjabi]
pt: português
[Portuguese]
qu: Runa Simi
[Quechua]
ro: română
[Romanian]
ru: русский
[Russian]
sa: संस्कृतम्
[Sanskrit]
sah: саха тыла
[Sakha]
scn: sicilianu
[Sicilian]
sco: Scots
sh: srpskohrvatski / српскохрватски
[Serbo-Croatian]
si: සිංහල
[Sinhalese]
simple: Simple English
sk: slovenčina
[Slovak]
sl: slovenščina
[Slovenian]
sq: shqip
[Albanian]
sr: српски / srpski
[Serbian]
su: Basa Sunda
[Sundanese]
sv: svenska
[Swedish]
sw: Kiswahili
[Swahili]
ta: தமிழ்
[Tamil]
te: తెలుగు
[Telugu]
tg: тоҷикӣ
[Tajik]
th: ไทย
[Thai]
tl: Tagalog
tr: Türkçe
[Turkish]
tt: татарча/tatarça
[Tatar]
uk: українська
[Ukrainian]
ur: اردو
[Urdu]
uz: oʻzbekcha/ўзбекча
[Uzbek]
vec: vèneto
[Venetian]
vi: Tiếng Việt
[Vietnamese]
vo: Volapük
wa: walon
[Walloon]
war: Winaray
[Waray]
yi: ייִדיש
[Yiddish]
yo: Yorùbá
[Yoruba]
zh: 中文
[Chinese]
zh-min-nan: Bân-lâm-gú
[Min Nan]
zh-yue: 粵語
[Cantonese]
jump to random article
Find link is a tool written by Edward Betts .
searching for Weak key 8 found (184 total)
alternate case: weak key
Key stretching
(1,817 words)
[view diff]
exact match in snippet
view article
find links to article
In cryptography, key stretching techniques are used to make a possibly weak key , typically a password or passphrase, more secure against a brute-force
Gemalto
(4,348 words)
[view diff]
exact match in snippet
view article
find links to article
internally by Microsoft and many other companies, were affected by the Infineon weak key vulnerability, leaving their private keys deducible to attackers. Key partners
Shared secret
(239 words)
[view diff]
exact match in snippet
view article
find links to article
[citation needed] Key stretching – a method to create a stronger key from a weak key or a weak shared secret Security question – implementation method Handbook
Random number generator attack
(2,632 words)
[view diff]
exact match in snippet
view article
find links to article
checks against a weak key blacklist to attempt to prevent use of any of these remaining weak keys, but researchers continue to find weak key implementations
Sophie Germain Counter Mode
(196 words)
[view diff]
exact match in snippet
view article
find links to article
Germain prime p − 1/2 = 2127 + 6225. SGCM does prevent the specific "weak key " attack described in its paper, however there are other ways of modifying
Station-to-Station protocol
(1,213 words)
[view diff]
exact match in snippet
view article
find links to article
prevent an active attacker from inserting weak parameters (and thus a weak key K). Diffie, van Oorschot & Wiener (1992) recommend against special checks
RC4
(5,062 words)
[view diff]
exact match in snippet
view article
find links to article
many applications that use RC4 simply concatenate key and nonce; RC4's weak key schedule then gives rise to related-key attacks, like the Fluhrer, Mantin
Hawaii's Opportunity Probation with Enforcement
(2,149 words)
[view diff]
case mismatch in snippet
view article
find links to article
effectiveness of the HOPE project: 1. An Over-Emphasis on a Potentially Weak Key Ingredient: the use of swift-and-certain sanctions. HOPE assumes that specific