Browse using
OpenLink Faceted Browser
OpenLink Structured Data Editor
LodLive Browser
Formats
RDF:
N-Triples
N3
Turtle
JSON
XML
OData:
Atom
JSON
Microdata:
JSON
HTML
Embedded:
JSON
Turtle
Other:
CSV
JSON-LD
Faceted Browser
Sparql Endpoint
About:
http://dbpedia.org/class/yago/WikicatCryptographicAttacks
An Entity of Type:
Thing
,
from Named Graph:
http://dbpedia.org
,
within Data Space:
dbpedia.org
Property
Value
rdfs:
subClassOf
yago
:Attack100972621
owl:
equivalentClass
yago-res
:wikicat_Cryptographic_attacks
is
rdf:
type
of
dbr
:Preimage_attack
dbr
:Pwdump
dbr
:Rubber-hose_cryptanalysis
dbr
:Mod_n_cryptanalysis
dbr
:N-gram
dbr
:MD5CRK
dbr
:Message_forgery
dbr
:Sinkov_statistic
dbr
:Partitioning_cryptanalysis
dbr
:Passive_attack
dbr
:Black_bag_operation
dbr
:Cube_attack
dbr
:Custom_hardware_attack
dbr
:Duqu
dbr
:Index_of_coincidence
dbr
:Integral_cryptanalysis
dbr
:Interlock_protocol
dbr
:Interpolation_attack
dbr
:Steganalysis
dbr
:Decimalization_table_attack
dbr
:Contact_analysis_(cryptanalysis)
dbr
:Meet-in-the-middle_attack
dbr
:DSploit
dbr
:Turingery
dbr
:Small_subgroup_confinement_attack
dbr
:Weak_key
dbr
:Ciphertext-only_attack
dbr
:Coppersmith's_attack
dbr
:Correlation_attack
dbr
:CryptoLocker
dbr
:Chosen-ciphertext_attack
dbr
:Chosen-plaintext_attack
dbr
:Stuxnet
dbr
:Clock_drift
dbr
:Collision_attack
dbr
:Hardware_keylogger
dbr
:Davies'_attack
dbr
:Key-recovery_attack
dbr
:Keystroke_logging
dbr
:Piling-up_lemma
dbr
:Microsoft_Office_password_protection
dbr
:Rootkit
dbr
:Brute-force_attack
dbr
:Adaptive_chosen-ciphertext_attack
dbr
:Wiener's_attack
dbr
:Distinguishing_attack
dbr
:Distributed.net
dbr
:Gardening_(cryptanalysis)
dbr
:Collision_(computer_science)
dbr
:Kasiski_examination
dbr
:Linear_cryptanalysis
dbr
:3-subset_meet-in-the-middle_attack
dbr
:Cyclometer
dbr
:Banburismus
dbr
:Dictionary_attack
dbr
:Differential-linear_attack
dbr
:Differential_cryptanalysis
dbr
:Differential_equations_of_addition
dbr
:Password_cracking
dbr
:Rainbow_table
dbr
:Replay_attack
dbr
:Attack_model
dbr
:Acoustic_cryptanalysis
dbr
:Adversary_(cryptography)
dbr
:Biclique_attack
dbr
:Birthday_attack
dbr
:Bit-flipping_attack
dbr
:Black-bag_cryptanalysis
dbr
:Table_of_costs_of_operations_in_elliptic_curves
dbr
:Cold_boot_attack
dbr
:Higher-order_differential_cryptanalysis
dbr
:XSL_attack
dbr
:Rebound_attack
dbr
:Related-key_attack
dbr
:Boomerang_attack
dbr
:Frequency_analysis
dbr
:Known-plaintext_attack
dbr
:Metasploit_Project
dbr
:Brute-force_search
dbr
:Shamoon
dbr
:Kiss_(cryptanalysis)
dbr
:Man-in-the-middle_attack
dbr
:Side-channel_attack
dbr
:Watermarking_attack
dbr
:Negligible_function
dbr
:Impossible_differential_cryptanalysis
dbr
:Lucky_Thirteen_attack
dbr
:Partial-matching_Meet-in-the-Middle_attack
dbr
:Pre-play_attack
dbr
:Venona_project
dbr
:Rotational_cryptanalysis
dbr
:Flame_(malware)
dbr
:Stream_cipher_attack
dbr
:Zygalski_sheets
dbr
:Slide_attack
dbr
:Truncated_differential_cryptanalysis
dbr
:Padding_oracle_attack
dbr
:Zendian_problem
dbr
:Supply_chain_attack
dbr
:Ransomware
This content was extracted from
Wikipedia
and is licensed under the
Creative Commons Attribution-ShareAlike 3.0 Unported License