Brute force attack/Related Articles: Difference between revisions
Jump to navigation
Jump to search
imported>Howard C. Berkowitz (New page: {{subpages}} ==Parent topics== {{r|Cryptanalysis}} ==Subtopics== <!-- List topics here that are included by this topic. --> ==Other related topics== <!-- List topics here that are r...) |
imported>Howard C. Berkowitz No edit summary |
||
(One intermediate revision by one other user not shown) | |||
Line 4: | Line 4: | ||
==Parent topics== | ==Parent topics== | ||
{{r|Computability theory}} | |||
{{r|Computational complexity theory}} | |||
{{r|Complexity of algorithms}} | |||
{{r|Cryptanalysis}} | {{r|Cryptanalysis}} | ||
{{r|Passive attack}} | |||
==Subtopics== | ==Subtopics== | ||
{{r|Plaintext recognition}} | |||
==Other related topics== | ==Other related topics== | ||
{{r|Parallel computation}} |
Latest revision as of 09:03, 2 April 2009
- See also changes related to Brute force attack, or pages that link to Brute force attack or to this page or whose text contains "Brute force attack".
Parent topics
- Computability theory [r]: Add brief definition or description
- Computational complexity theory [r]: Add brief definition or description
- Complexity of algorithms [r]: How fast the execution time (or memory usage) increases as the data set to be processed grows. [e]
- Cryptanalysis [r]: The sub-field of cryptology which deals with breaking into existing codes and ciphers. [e]
- Passive attack [r]: An attack on a communications system in which the attacker reads messages he is not supposed to but does not alter them. [e]