What Users Should Know About Full Disk Encryption Based on LUKS
暂无分享,去创建一个
[1] Hugo Krawczyk,et al. Keying Hash Functions for Message Authentication , 1996, CRYPTO.
[2] Ken Thompson,et al. Password security: a case history , 1979, CACM.
[3] Tore Kasper Frederiksen. Using CUDA for Exhaustive Password Recovery , 2011 .
[4] Hugo Krawczyk,et al. HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.
[5] Tim Güneysu,et al. Evaluation of Standardized Password-Based Key Derivation against Parallel Processing Platforms , 2012, ESORICS.
[6] Clemens Fruhwirth,et al. New Methods in Hard Disk Encryption , 2005 .
[7] Marc. Efficient Password and Key recovery using Graphic Cards , 2012 .
[8] Andrea Visconti,et al. On the Weaknesses of PBKDF2 , 2015, CANS.
[9] Peter Gutmann,et al. Secure deletion of data from magnetic and solid-state memory , 1996 .