A modified exhaustive search on a password system using SHA-1
暂无分享,去创建一个
[1] Ralph Howard,et al. Data encryption standard , 1987 .
[2] Ron Rivest. A Description of the RC2(r) Encryption Algorithm , 1998, RFC.
[3] Perry Metzger,et al. The ESP Triple DES Transform , 1995, RFC.
[4] 염흥렬,et al. [서평]「Applied Cryptography」 , 1997 .
[5] William Stallings,et al. PGP Message Exchange Formats , 1996, RFC.
[6] Jonathan Katz,et al. Introduction to Modern Cryptography: Principles and Protocols , 2007 .
[7] Joe Kilian,et al. How to Protect DES Against Exhaustive Key Search , 1996, CRYPTO.
[8] Yehuda Lindell,et al. Introduction to Modern Cryptography (Chapman & Hall/Crc Cryptography and Network Security Series) , 2007 .