gra-projekt/Ausarbeitung/Ausarbeitung.bib

164 lines
4.5 KiB
BibTeX
Raw Normal View History

2022-06-20 21:54:21 +02:00
@manual{intel2017man,
2022-07-24 17:00:38 +02:00
author = {{Intel Corporation}},
title = {Intel 64 and IA-32 Architectures Software Developers Manual},
year = {2016},
month = apr,
2022-06-20 21:54:21 +02:00
organization = {Intel Corporation},
2022-07-24 17:00:38 +02:00
note = {\url{http://www.intel.com/content/www/us/en/processors/architectures-software-developer-manuals.html},
besucht am 2017-08-19}
}
@manual{md2man,
author = {{B. Kaliski}},
title = {The MD2 Message-Digest Algorithm},
year = {1992},
month = apr,
organization = {RSA Laboratories},
note = {\url{https://datatracker.ietf.org/doc/html/rfc1319},
besucht am 16.07.2022}
}
@manual{cmsman,
author = {{R. Housley}},
title = {Cryptographic Message Syntax (CMS)},
year = {2009},
month = sep,
organization = {Vigil Security},
note = {\url{https://datatracker.ietf.org/doc/html/rfc5652#section-6.3},
besucht am 18.07.2022}
}
@manual{md2berechnung,
title = {Kommunikation und verteilte Systeme, Kapitel 2.3 Hash Functions},
year = {2007},
organization = {RWTH Aachen},
note = {\url{http://www-i4.informatik.rwth-aachen.de/content/teaching/lectures/sub/sikon/sikonSS07/05_Hash_1P.pdf},
besucht am 20.07.2022}
}
@manual{pidigits,
author = {{mikeazo}},
year = {2014},
note = {\url{https://crypto.stackexchange.com/questions/11935/how-is-the-md2-hash-function-s-table-constructed-from-pi},
besucht am 20.07.2022}
}
@manual{preimage,
author = {{S. Thomsen}},
title = {An improved preimage attack on MD2},
year = {2008},
organization = {Technical University of Denmark},
note = {\url{https://eprint.iacr.org/2008/089.pdf},
besucht am 20.07.2022}
}
@manual{notoneway,
author = {{F. Muller}},
year = {2004},
title = {The MD2 Hash Function Is Not One-Way},
note = {\url{https://www.iacr.org/archive/asiacrypt2004/33290211/33290211.pdf},
besucht am 20.07.2022}
}
@manual{collisionattack,
author = {{L. Knudsen et al.}},
year = {2010},
title = {Cryptanalysis of MD2},
organization = {Technical University of Denmark},
note = {\url{https://link.springer.com/content/pdf/10.1007/s00145-009-9054-1.pdf},
besucht am 23.07.2022}
}
@manual{md5,
author = {{X. Wang et al.}},
year = {2005},
title = {How to Break MD5 and Other Hash Functions},
organization = {Shandong University},
note = {\url{http://merlot.usc.edu/csac-f06/papers/Wang05a.pdf},
besucht am 23.07.2022}
}
@manual{sha256,
author = {{S. Turner}},
year = {2011},
month = {March},
title = {MD2 to Historic Status},
organization = {Independent Educational Consultants Association},
note = {\url{https://datatracker.ietf.org/doc/html/rfc6149#section-7},
besucht am 23.07.2022}
}
@manual{sha265secure,
author={National Institute of Standards and Technology},
title={Secure Hash Standard (SHS)},
year={2015},
month={August},
note = {\url{https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf},
besucht am 23.07.2022}
}
@book{hashing-in-computer-science,
author = {Alan G. Konheim},
title = {Hashing in Computer Science : Fifty Years of Slicing and Dicing},
year = {2010},
month = jul
}
@book{hashing-techniques,
author = {Lianhua Chi, Xingquan Zhu},
title = {Hashing Techniques: A Survey and Taxonomy},
year = {2018},
month = jan
}
@INPROCEEDINGS{salt-password-hashes,
author={Gauravaram, Praveen},
booktitle={2012 International Conference on Advanced Computer Science Applications and Technologies (ACSAT)},
title={Security Analysis of salt||password Hashes},
year={2012},
volume={},
number={},
pages={25-30},
doi={10.1109/ACSAT.2012.49}}
2022-06-20 21:54:21 +02:00
}
2022-07-24 17:00:38 +02:00
@ARTICLE{what-is-blockchain,
author={{Di Pierro, Massimo}},
2022-07-24 23:20:09 +02:00
journal={Computing in Science \& Engineering},
2022-07-24 17:00:38 +02:00
title={What Is the Blockchain?},
year={2017},
volume={19},
number={5},
pages={92-95},
doi={10.1109/MCSE.2017.3421554}
}
@manual{pgp-message-formats,
author={D. Atkins},
title={PGP Message Exchange Formats},
year={1996},
month = aug,
note = {\url{https://www.rfc-editor.org/rfc/rfc1991},
besucht am 21.07.2022}
}
@manual{md4,
author={{Bert den Boer, Antoon Bosselaers}},
title={An Attack on the Last Two Rounds of MD4},
year={1991},
note = {\url{https://web.archive.org/web/20030523231212/http://dsns.csie.nctu.edu.tw/research/crypto/HTML/PDF/C91/194.PDF},
besucht am 23.07.2022}
}
@manual{mooreslaw,
author={{ Arjen K. Lenstra }},
title={Key Lengths},
year={2006},
organization={Citibank, N.A., and Technische Universiteit Eindhoven},
note={\url{https://infoscience.epfl.ch/record/164539/files/NPDF-32.pdf},
besucht am 24.07.2022}
}