A Novel Rainbow Table Sorting Method
暂无分享,去创建一个
[1] Vitaly Shmatikov,et al. Fast dictionary attacks on passwords using time-space tradeoff , 2005, CCS '05.
[2] Dobromir Todorov. Mechanics of User Identification and Authentication: Fundamentals of Identity Management , 2007 .
[3] Yu Sasaki,et al. Security of MD5 Challenge and Response: Extension of APOP Password Recovery Attack , 2008, CT-RSA.
[4] Philippe Oechslin,et al. Making a Faster Cryptanalytic Time-Memory Trade-Off , 2003, CRYPTO.
[5] Sara M. Smyth. Searches of Computers and Computer Data at the United States Border: The Need for a New Framework Following United States v. Arnold , 2009 .
[6] Gaëtan Leurent,et al. Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5 , 2007, CRYPTO.
[7] Martin E. Hellman,et al. A cryptanalytic time-memory trade-off , 1980, IEEE Trans. Inf. Theory.
[8] Yu Sasaki,et al. Practical Password Recovery on an MD5 Challenge and Response , 2007, IACR Cryptol. ePrint Arch..
[9] Dorothy E. Denning,et al. Cryptography and Data Security , 1982 .
[10] Scott Contini,et al. Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions , 2006, ASIACRYPT.
[11] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[12] Vrizlynn L. L. Thing,et al. A novel time-memory trade-off method for password recovery , 2009 .
[13] Bart Preneel,et al. RIPEMD-160: A Strengthened Version of RIPEMD , 1996, FSE.