Acceleration Attacks on PBKDF2: Or, What Is inside the Black-Box of oclHashcat?
暂无分享,去创建一个
[1] Burton S. Kaliski,et al. PKCS #5: Password-Based Cryptography Specification Version 2.0 , 2000, RFC.
[2] Tore Kasper Frederiksen. Using CUDA for Exhaustive Password Recovery , 2011 .
[3] Elaine B. Barker,et al. The Keyed-Hash Message Authentication Code (HMAC) | NIST , 2002 .
[4] Hugo Krawczyk,et al. HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.
[5] John Freeman,et al. From opencl to high-performance hardware on FPGAS , 2012, 22nd International Conference on Field Programmable Logic and Applications (FPL).
[6] Tim Güneysu,et al. Evaluation of Standardized Password-Based Key Derivation against Parallel Processing Platforms , 2012, ESORICS.
[7] F. Frances Yao,et al. Design and analysis of password-based key derivation functions , 2005, IEEE Transactions on Information Theory.
[8] Pham Hong Phong,et al. Password recovery for encrypted ZIP archives using GPUs , 2010, SoICT '10.
[9] Roel Verdult,et al. Scrutinizing WPA2 Password Generating Algorithms in Wireless Routers , 2015, WOOT.
[10] Marc. Efficient Password and Key recovery using Graphic Cards , 2012 .
[11] 栄 久米原,et al. Wiresharkパケット解析リファレンス : Network Protocol Analyzer , 2009 .