Password Recovery Research and its Future Direction
暂无分享,去创建一个
[1] Yu Sasaki,et al. Security of MD5 Challenge and Response: Extension of APOP Password Recovery Attack , 2008, CT-RSA.
[2] Sara M. Smyth. Searches of Computers and Computer Data at the United States Border: The Need for a New Framework Following United States v. Arnold , 2009 .
[3] Gaëtan Leurent,et al. Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5 , 2007, CRYPTO.
[4] Scott Contini,et al. Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions , 2006, ASIACRYPT.
[5] Martin E. Hellman,et al. A cryptanalytic time-memory trade-off , 1980, IEEE Trans. Inf. Theory.
[6] Yu Sasaki,et al. Practical Password Recovery on an MD5 Challenge and Response , 2007, IACR Cryptol. ePrint Arch..
[7] Quynh H. Dang,et al. Secure Hash Standard | NIST , 2015 .
[8] Hwei-Ming Ying,et al. A Novel Rainbow Table Sorting Method , 2011 .
[9] Philippe Oechslin,et al. Making a Faster Cryptanalytic Time-Memory Trade-Off , 2003, CRYPTO.
[10] Dobromir Todorov. Mechanics of User Identification and Authentication: Fundamentals of Identity Management , 2007 .
[11] Vitaly Shmatikov,et al. Fast dictionary attacks on passwords using time-space tradeoff , 2005, CCS '05.
[12] Vrizlynn L. L. Thing,et al. A novel time-memory trade-off method for password recovery , 2009 .
[13] Bart Preneel,et al. RIPEMD-160: A Strengthened Version of RIPEMD , 1996, FSE.
[14] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.