메뉴 건너뛰기




Volumn 3, Issue 3, 2006, Pages 138-150

Unique file identification in the National Software Reference Library

Author keywords

Collisions; Computer forensics; Digital fingerprint; File hashing; File signature; MD5; National Software Reference Library; SHA 1

Indexed keywords

ALGORITHMS; COMPUTER OPERATING SYSTEMS; COMPUTER SELECTION AND EVALUATION; COMPUTER SOFTWARE; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; INFORMATION ANALYSIS; LAW ENFORCEMENT; PATTERN RECOGNITION;

EID: 33750375174     PISSN: 17422876     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.diin.2006.08.010     Document Type: Article
Times cited : (22)

References (32)
  • 1
    • 33750330097 scopus 로고    scopus 로고
    • [Last accessed: August 2005]
    • Bass I. Hypotheses testing (2003). [Last accessed: August 2005]
    • (2003) Hypotheses testing
    • Bass, I.1
  • 6
    • 0001849866 scopus 로고    scopus 로고
    • The status of MD5 after recent attack
    • [RSA Laboratories]
    • Dobbertin H. The status of MD5 after recent attack. [RSA Laboratories]. CryptoBytes 2 2 (1996)
    • (1996) CryptoBytes , vol.2 , Issue.2
    • Dobbertin, H.1
  • 7
    • 33746025953 scopus 로고    scopus 로고
    • Catch me if you can
    • [Last accessed: January 2006]
    • Foster J., and Liu V. Catch me if you can. Black hat briefings, 2005 (2005-2005). [Last accessed: January 2006]
    • (2005) Black hat briefings, 2005
    • Foster, J.1    Liu, V.2
  • 8
    • 33750308173 scopus 로고
    • Data communications: high-level data link control procedures-frame structure (ISO 3309)
    • International Standards Organization. Data communications: high-level data link control procedures-frame structure (ISO 3309). IS 3009. 3rd ed ([10-1-1984])
    • (1984) IS 3009. 3rd ed
    • International Standards Organization1
  • 9
    • 33645780237 scopus 로고    scopus 로고
    • Multicollisions in iterated hash functions: application to cascaded constructions
    • Springer p. 306-16
    • Joux A. Multicollisions in iterated hash functions: application to cascaded constructions. Advances in cryptology-crypto 2004 vol. 3152 (2004), Springer p. 306-16
    • (2004) Advances in cryptology-crypto 2004 , vol.3152
    • Joux, A.1
  • 12
    • 33746766048 scopus 로고    scopus 로고
    • Finding MD5 collisions-a toy for a notebook
    • [Last accessed: September 2005]
    • Klima V. Finding MD5 collisions-a toy for a notebook. Cryptology ePrint Archive: Report 2005/075 (March 2005-March 2005). [Last accessed: September 2005]
    • (2005) Cryptology ePrint Archive: Report 2005/075
    • Klima, V.1
  • 13
    • 0003657590 scopus 로고
    • The art of computer programming
    • Addison Wesley, Reading, MA
    • Knuth D. The art of computer programming. Seminumerical algorithms (1993), Addison Wesley, Reading, MA
    • (1993) Seminumerical algorithms
    • Knuth, D.1
  • 22
    • 0029924587 scopus 로고    scopus 로고
    • Pincus S, Singer B, Randomness and degrees of irregularity. Proceedings of the National Academy of Science. 3-5-1996;93(5)
  • 24
    • 0034341923 scopus 로고    scopus 로고
    • Approximate entropy for testing randomness
    • Rukhin A. Approximate entropy for testing randomness. Journal of Applied Probability 37 (2000)
    • (2000) Journal of Applied Probability , vol.37
    • Rukhin, A.1
  • 25
    • 3843081053 scopus 로고    scopus 로고
    • A statistical test suite for random and pseudorandom number generators for cryptographic applications
    • [Revised: May 2001]
    • Rukhin A., Soto J., et al. A statistical test suite for random and pseudorandom number generators for cryptographic applications. NIST Special Publication 800-22 (2001) [Revised: May 2001]
    • (2001) NIST Special Publication 800-22
    • Rukhin, A.1    Soto, J.2
  • 26
    • 14544271706 scopus 로고    scopus 로고
    • Cryptanalysis of MD5 and SHA: time for a new standard
    • Schneier B. Cryptanalysis of MD5 and SHA: time for a new standard. Computer World (August 2004)
    • (2004) Computer World
    • Schneier, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.