2022-06-20 21:54:21 +02:00
|
|
|
|
@manual{intel2017man,
|
2022-07-24 17:00:38 +02:00
|
|
|
|
author = {{Intel Corporation}},
|
|
|
|
|
title = {Intel 64 and IA-32 Architectures Software Developer’s Manual},
|
|
|
|
|
year = {2016},
|
|
|
|
|
month = apr,
|
2022-06-20 21:54:21 +02:00
|
|
|
|
organization = {Intel Corporation},
|
2022-07-24 17:00:38 +02:00
|
|
|
|
note = {\url{http://www.intel.com/content/www/us/en/processors/architectures-software-developer-manuals.html},
|
|
|
|
|
besucht am 2017-08-19}
|
|
|
|
|
}
|
|
|
|
|
@manual{md2man,
|
|
|
|
|
author = {{B. Kaliski}},
|
|
|
|
|
title = {The MD2 Message-Digest Algorithm},
|
|
|
|
|
year = {1992},
|
|
|
|
|
month = apr,
|
|
|
|
|
organization = {RSA Laboratories},
|
|
|
|
|
note = {\url{https://datatracker.ietf.org/doc/html/rfc1319},
|
|
|
|
|
besucht am 16.07.2022}
|
|
|
|
|
}
|
|
|
|
|
@manual{cmsman,
|
|
|
|
|
author = {{R. Housley}},
|
|
|
|
|
title = {Cryptographic Message Syntax (CMS)},
|
|
|
|
|
year = {2009},
|
|
|
|
|
month = sep,
|
|
|
|
|
organization = {Vigil Security},
|
|
|
|
|
note = {\url{https://datatracker.ietf.org/doc/html/rfc5652#section-6.3},
|
|
|
|
|
besucht am 18.07.2022}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
@manual{md2berechnung,
|
|
|
|
|
title = {Kommunikation und verteilte Systeme, Kapitel 2.3 Hash Functions},
|
|
|
|
|
year = {2007},
|
|
|
|
|
organization = {RWTH Aachen},
|
|
|
|
|
note = {\url{http://www-i4.informatik.rwth-aachen.de/content/teaching/lectures/sub/sikon/sikonSS07/05_Hash_1P.pdf},
|
|
|
|
|
besucht am 20.07.2022}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
@manual{pidigits,
|
|
|
|
|
author = {{mikeazo}},
|
|
|
|
|
year = {2014},
|
|
|
|
|
note = {\url{https://crypto.stackexchange.com/questions/11935/how-is-the-md2-hash-function-s-table-constructed-from-pi},
|
|
|
|
|
besucht am 20.07.2022}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
@manual{preimage,
|
|
|
|
|
author = {{S. Thomsen}},
|
|
|
|
|
title = {An improved preimage attack on MD2},
|
|
|
|
|
year = {2008},
|
|
|
|
|
organization = {Technical University of Denmark},
|
|
|
|
|
note = {\url{https://eprint.iacr.org/2008/089.pdf},
|
|
|
|
|
besucht am 20.07.2022}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
@manual{notoneway,
|
|
|
|
|
author = {{F. Muller}},
|
|
|
|
|
year = {2004},
|
|
|
|
|
title = {The MD2 Hash Function Is Not One-Way},
|
|
|
|
|
note = {\url{https://www.iacr.org/archive/asiacrypt2004/33290211/33290211.pdf},
|
|
|
|
|
besucht am 20.07.2022}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
@manual{collisionattack,
|
|
|
|
|
author = {{L. Knudsen et al.}},
|
|
|
|
|
year = {2010},
|
|
|
|
|
title = {Cryptanalysis of MD2},
|
|
|
|
|
organization = {Technical University of Denmark},
|
|
|
|
|
note = {\url{https://link.springer.com/content/pdf/10.1007/s00145-009-9054-1.pdf},
|
|
|
|
|
besucht am 23.07.2022}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
@manual{md5,
|
|
|
|
|
author = {{X. Wang et al.}},
|
|
|
|
|
year = {2005},
|
|
|
|
|
title = {How to Break MD5 and Other Hash Functions},
|
|
|
|
|
organization = {Shandong University},
|
|
|
|
|
note = {\url{http://merlot.usc.edu/csac-f06/papers/Wang05a.pdf},
|
|
|
|
|
besucht am 23.07.2022}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
@manual{sha256,
|
|
|
|
|
author = {{S. Turner}},
|
|
|
|
|
year = {2011},
|
|
|
|
|
month = {March},
|
|
|
|
|
title = {MD2 to Historic Status},
|
|
|
|
|
organization = {Independent Educational Consultants Association},
|
|
|
|
|
note = {\url{https://datatracker.ietf.org/doc/html/rfc6149#section-7},
|
|
|
|
|
besucht am 23.07.2022}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
@manual{sha265secure,
|
|
|
|
|
author={National Institute of Standards and Technology},
|
|
|
|
|
title={Secure Hash Standard (SHS)},
|
|
|
|
|
year={2015},
|
|
|
|
|
month={August},
|
|
|
|
|
note = {\url{https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf},
|
|
|
|
|
besucht am 23.07.2022}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
@book{hashing-in-computer-science,
|
|
|
|
|
author = {Alan G. Konheim},
|
|
|
|
|
title = {Hashing in Computer Science : Fifty Years of Slicing and Dicing},
|
|
|
|
|
year = {2010},
|
|
|
|
|
month = jul
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
@book{hashing-techniques,
|
|
|
|
|
author = {Lianhua Chi, Xingquan Zhu},
|
|
|
|
|
title = {Hashing Techniques: A Survey and Taxonomy},
|
|
|
|
|
year = {2018},
|
|
|
|
|
month = jan
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
@INPROCEEDINGS{salt-password-hashes,
|
|
|
|
|
author={Gauravaram, Praveen},
|
|
|
|
|
booktitle={2012 International Conference on Advanced Computer Science Applications and Technologies (ACSAT)},
|
|
|
|
|
title={Security Analysis of salt||password Hashes},
|
|
|
|
|
year={2012},
|
|
|
|
|
volume={},
|
|
|
|
|
number={},
|
|
|
|
|
pages={25-30},
|
|
|
|
|
doi={10.1109/ACSAT.2012.49}}
|
2022-06-20 21:54:21 +02:00
|
|
|
|
}
|
|
|
|
|
|
2022-07-24 17:00:38 +02:00
|
|
|
|
@ARTICLE{what-is-blockchain,
|
|
|
|
|
author={{Di Pierro, Massimo}},
|
|
|
|
|
journal={Computing in Science & Engineering},
|
|
|
|
|
title={What Is the Blockchain?},
|
|
|
|
|
year={2017},
|
|
|
|
|
volume={19},
|
|
|
|
|
number={5},
|
|
|
|
|
pages={92-95},
|
|
|
|
|
doi={10.1109/MCSE.2017.3421554}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
@manual{pgp-message-formats,
|
|
|
|
|
author={D. Atkins},
|
|
|
|
|
title={PGP Message Exchange Formats},
|
|
|
|
|
year={1996},
|
|
|
|
|
month = aug,
|
|
|
|
|
note = {\url{https://www.rfc-editor.org/rfc/rfc1991},
|
|
|
|
|
besucht am 21.07.2022}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
@manual{md4,
|
|
|
|
|
author={{Bert den Boer, Antoon Bosselaers}},
|
|
|
|
|
title={An Attack on the Last Two Rounds of MD4},
|
|
|
|
|
year={1991},
|
|
|
|
|
note = {\url{https://web.archive.org/web/20030523231212/http://dsns.csie.nctu.edu.tw/research/crypto/HTML/PDF/C91/194.PDF},
|
|
|
|
|
besucht am 23.07.2022}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
@manual{mooreslaw,
|
|
|
|
|
author={{ Arjen K. Lenstra }},
|
|
|
|
|
title={Key Lengths},
|
|
|
|
|
year={2006},
|
|
|
|
|
organization={Citibank, N.A., and Technische Universiteit Eindhoven},
|
|
|
|
|
note={\url{https://infoscience.epfl.ch/record/164539/files/NPDF-32.pdf},
|
|
|
|
|
besucht am 24.07.2022}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|