Implementing Rainbow Tables in High-End FPGAs for Super-Fast Password Cracking
暂无分享,去创建一个
[1] Ingrid Verbauwhede,et al. Cracking Unix Passwords using FPGA Platforms , 2005 .
[2] Michael J. Wiener. The Full Cost of Cryptanalytic Attacks , 2003, Journal of Cryptology.
[3] Ingrid Verbauwhede,et al. Time-Memory Trade-Off Attack on FPGA Platforms: UNIX Password Cracking , 2006, ARC.
[4] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[5] Ioannis Papaefstathiou,et al. HighEnd Reconfigurable Systems for Fast Windows' Password Cracking , 2009, 2009 17th IEEE Symposium on Field Programmable Custom Computing Machines.
[6] Pascal Junod,et al. Characterization and Improvement of Time-Memory Trade-Off Based on Perfect Tables , 2008, TSEC.
[7] Amos Fiat,et al. Rigorous time/space tradeoffs for inverting functions , 1991, STOC '91.
[8] Martin E. Hellman,et al. A cryptanalytic time-memory trade-off , 1980, IEEE Trans. Inf. Theory.
[9] Tsutomu Matsumoto,et al. Optimization of Time-Memory Trade-Off Cryptanalysis and Its Application to DES, FEAL-32, and Skipjack (Special Section on Cryptography and Information Security) , 1996 .
[10] Joos Vandewalle,et al. On the time-memory tradeoff between exhaustive key search and table precomputation , 1998 .
[11] Jean-Didier Legat,et al. A Cryptanalytic Time-Memory Tradeoff: First FPGA Implementation , 2002, FPL.
[12] Philippe Oechslin,et al. Making a Faster Cryptanalytic Time-Memory Trade-Off , 2003, CRYPTO.