gra-projekt/Ausarbeitung/Ausarbeitung.bib
2022-07-24 23:20:09 +02:00

163 lines
4.5 KiB
BibTeX
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

@manual{intel2017man,
author = {{Intel Corporation}},
title = {Intel 64 and IA-32 Architectures Software Developers Manual},
year = {2016},
month = apr,
organization = {Intel Corporation},
note = {\url{http://www.intel.com/content/www/us/en/processors/architectures-software-developer-manuals.html},
besucht am 2017-08-19}
}
@manual{md2man,
author = {{B. Kaliski}},
title = {The MD2 Message-Digest Algorithm},
year = {1992},
month = apr,
organization = {RSA Laboratories},
note = {\url{https://datatracker.ietf.org/doc/html/rfc1319},
besucht am 16.07.2022}
}
@manual{cmsman,
author = {{R. Housley}},
title = {Cryptographic Message Syntax (CMS)},
year = {2009},
month = sep,
organization = {Vigil Security},
note = {\url{https://datatracker.ietf.org/doc/html/rfc5652#section-6.3},
besucht am 18.07.2022}
}
@manual{md2berechnung,
title = {Kommunikation und verteilte Systeme, Kapitel 2.3 Hash Functions},
year = {2007},
organization = {RWTH Aachen},
note = {\url{http://www-i4.informatik.rwth-aachen.de/content/teaching/lectures/sub/sikon/sikonSS07/05_Hash_1P.pdf},
besucht am 20.07.2022}
}
@manual{pidigits,
author = {{mikeazo}},
year = {2014},
note = {\url{https://crypto.stackexchange.com/questions/11935/how-is-the-md2-hash-function-s-table-constructed-from-pi},
besucht am 20.07.2022}
}
@manual{preimage,
author = {{S. Thomsen}},
title = {An improved preimage attack on MD2},
year = {2008},
organization = {Technical University of Denmark},
note = {\url{https://eprint.iacr.org/2008/089.pdf},
besucht am 20.07.2022}
}
@manual{notoneway,
author = {{F. Muller}},
year = {2004},
title = {The MD2 Hash Function Is Not One-Way},
note = {\url{https://www.iacr.org/archive/asiacrypt2004/33290211/33290211.pdf},
besucht am 20.07.2022}
}
@manual{collisionattack,
author = {{L. Knudsen et al.}},
year = {2010},
title = {Cryptanalysis of MD2},
organization = {Technical University of Denmark},
note = {\url{https://link.springer.com/content/pdf/10.1007/s00145-009-9054-1.pdf},
besucht am 23.07.2022}
}
@manual{md5,
author = {{X. Wang et al.}},
year = {2005},
title = {How to Break MD5 and Other Hash Functions},
organization = {Shandong University},
note = {\url{http://merlot.usc.edu/csac-f06/papers/Wang05a.pdf},
besucht am 23.07.2022}
}
@manual{sha256,
author = {{S. Turner}},
year = {2011},
month = {March},
title = {MD2 to Historic Status},
organization = {Independent Educational Consultants Association},
note = {\url{https://datatracker.ietf.org/doc/html/rfc6149#section-7},
besucht am 23.07.2022}
}
@manual{sha265secure,
author={National Institute of Standards and Technology},
title={Secure Hash Standard (SHS)},
year={2015},
month={August},
note = {\url{https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf},
besucht am 23.07.2022}
}
@book{hashing-in-computer-science,
author = {Alan G. Konheim},
title = {Hashing in Computer Science : Fifty Years of Slicing and Dicing},
year = {2010},
month = jul
}
@book{hashing-techniques,
author = {Lianhua Chi, Xingquan Zhu},
title = {Hashing Techniques: A Survey and Taxonomy},
year = {2018},
month = jan
}
@INPROCEEDINGS{salt-password-hashes,
author={Gauravaram, Praveen},
booktitle={2012 International Conference on Advanced Computer Science Applications and Technologies (ACSAT)},
title={Security Analysis of salt||password Hashes},
year={2012},
volume={},
number={},
pages={25-30},
doi={10.1109/ACSAT.2012.49}}
}
@ARTICLE{what-is-blockchain,
author={{Di Pierro, Massimo}},
journal={Computing in Science \& Engineering},
title={What Is the Blockchain?},
year={2017},
volume={19},
number={5},
pages={92-95},
doi={10.1109/MCSE.2017.3421554}
}
@manual{pgp-message-formats,
author={D. Atkins},
title={PGP Message Exchange Formats},
year={1996},
month = aug,
note = {\url{https://www.rfc-editor.org/rfc/rfc1991},
besucht am 21.07.2022}
}
@manual{md4,
author={{Bert den Boer, Antoon Bosselaers}},
title={An Attack on the Last Two Rounds of MD4},
year={1991},
note = {\url{https://web.archive.org/web/20030523231212/http://dsns.csie.nctu.edu.tw/research/crypto/HTML/PDF/C91/194.PDF},
besucht am 23.07.2022}
}
@manual{mooreslaw,
author={{ Arjen K. Lenstra }},
title={Key Lengths},
year={2006},
organization={Citibank, N.A., and Technische Universiteit Eindhoven},
note={\url{https://infoscience.epfl.ch/record/164539/files/NPDF-32.pdf},
besucht am 24.07.2022}
}