@manual{intel2017man, author = {{Intel Corporation}}, title = {Intel 64 and IA-32 Architectures Software Developer’s Manual}, year = {2016}, month = apr, organization = {Intel Corporation}, note = {\url{http://www.intel.com/content/www/us/en/processors/architectures-software-developer-manuals.html}, besucht am 2017-08-19} } @manual{md2man, author = {{B. Kaliski}}, title = {The MD2 Message-Digest Algorithm}, year = {1992}, month = apr, organization = {RSA Laboratories}, note = {\url{https://datatracker.ietf.org/doc/html/rfc1319}, besucht am 16.07.2022} } @manual{cmsman, author = {{R. Housley}}, title = {Cryptographic Message Syntax (CMS)}, year = {2009}, month = sep, organization = {Vigil Security}, note = {\url{https://datatracker.ietf.org/doc/html/rfc5652#section-6.3}, besucht am 18.07.2022} } @manual{md2berechnung, title = {Kommunikation und verteilte Systeme, Kapitel 2.3 Hash Functions}, year = {2007}, organization = {RWTH Aachen}, note = {\url{http://www-i4.informatik.rwth-aachen.de/content/teaching/lectures/sub/sikon/sikonSS07/05_Hash_1P.pdf}, besucht am 20.07.2022} } @manual{pidigits, author = {{mikeazo}}, year = {2014}, note = {\url{https://crypto.stackexchange.com/questions/11935/how-is-the-md2-hash-function-s-table-constructed-from-pi}, besucht am 20.07.2022} } @manual{preimage, author = {{S. Thomsen}}, title = {An improved preimage attack on MD2}, year = {2008}, organization = {Technical University of Denmark}, note = {\url{https://eprint.iacr.org/2008/089.pdf}, besucht am 20.07.2022} } @manual{notoneway, author = {{F. Muller}}, year = {2004}, title = {The MD2 Hash Function Is Not One-Way}, note = {\url{https://www.iacr.org/archive/asiacrypt2004/33290211/33290211.pdf}, besucht am 20.07.2022} } @manual{collisionattack, author = {{L. Knudsen et al.}}, year = {2010}, title = {Cryptanalysis of MD2}, organization = {Technical University of Denmark}, note = {\url{https://link.springer.com/content/pdf/10.1007/s00145-009-9054-1.pdf}, besucht am 23.07.2022} } @manual{md5, author = {{X. Wang et al.}}, year = {2005}, title = {How to Break MD5 and Other Hash Functions}, organization = {Shandong University}, note = {\url{http://merlot.usc.edu/csac-f06/papers/Wang05a.pdf}, besucht am 23.07.2022} } @manual{sha256, author = {{S. Turner}}, year = {2011}, month = {March}, title = {MD2 to Historic Status}, organization = {Independent Educational Consultants Association}, note = {\url{https://datatracker.ietf.org/doc/html/rfc6149#section-7}, besucht am 23.07.2022} } @manual{sha265secure, author={National Institute of Standards and Technology}, title={Secure Hash Standard (SHS)}, year={2015}, month={August}, note = {\url{https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf}, besucht am 23.07.2022} } @book{hashing-in-computer-science, author = {Alan G. Konheim}, title = {Hashing in Computer Science : Fifty Years of Slicing and Dicing}, year = {2010}, month = jul } @book{hashing-techniques, author = {Lianhua Chi, Xingquan Zhu}, title = {Hashing Techniques: A Survey and Taxonomy}, year = {2018}, month = jan } @INPROCEEDINGS{salt-password-hashes, author={Gauravaram, Praveen}, booktitle={2012 International Conference on Advanced Computer Science Applications and Technologies (ACSAT)}, title={Security Analysis of salt||password Hashes}, year={2012}, volume={}, number={}, pages={25-30}, doi={10.1109/ACSAT.2012.49}} } @ARTICLE{what-is-blockchain, author={{Di Pierro, Massimo}}, journal={Computing in Science & Engineering}, title={What Is the Blockchain?}, year={2017}, volume={19}, number={5}, pages={92-95}, doi={10.1109/MCSE.2017.3421554} } @manual{pgp-message-formats, author={D. Atkins}, title={PGP Message Exchange Formats}, year={1996}, month = aug, note = {\url{https://www.rfc-editor.org/rfc/rfc1991}, besucht am 21.07.2022} } @manual{md4, author={{Bert den Boer, Antoon Bosselaers}}, title={An Attack on the Last Two Rounds of MD4}, year={1991}, note = {\url{https://web.archive.org/web/20030523231212/http://dsns.csie.nctu.edu.tw/research/crypto/HTML/PDF/C91/194.PDF}, besucht am 23.07.2022} } @manual{mooreslaw, author={{ Arjen K. Lenstra }}, title={Key Lengths}, year={2006}, organization={Citibank, N.A., and Technische Universiteit Eindhoven}, note={\url{https://infoscience.epfl.ch/record/164539/files/NPDF-32.pdf}, besucht am 24.07.2022} }