IP Authentication using Keyed MD5
暂无分享,去创建一个
[1] John M. Carroll,et al. Weak Keys and Weak Data Foiling the Two Nemeses , 1994, Cryptologia.
[2] Jon Postel,et al. Assigned Numbers , 1979, RFC.
[3] Joseph D. Touch,et al. Report on MD5 Performance , 1995, RFC.
[4] Jon Postel. Internet Official Protocol Standards , 1993, RFC.
[5] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[6] Paul C. van Oorschot,et al. Parallel collision search with application to hash functions and discrete logarithms , 1994, CCS '94.
[7] Antoon Bosselaers,et al. Collisions for the Compressin Function of MD5 , 1994, EUROCRYPT.
[8] 염흥렬,et al. [서평]「Applied Cryptography」 , 1997 .
[9] Keith McCloghrie,et al. Security Protocols for version 2 of the Simple Network Management Protocol (SNMPv2) , 1993, RFC.