-
1
-
-
0013194031
-
-
RFC 2617 (Draft Standard), Jun. [Online]. Available
-
J. Franks, P. Hallam-Baker, J. Hostetler, S. Lawrence, P. Leach, A. Luotonen, and L. Stewart, "HTTP Authentication: Basic and Digest Access Authentication," RFC 2617 (Draft Standard), Internet Engineering Task Force, Jun. 1999. [Online]. Available: http://www.ietf.org/rfc/rfc2617.txt
-
(1999)
HTTP Authentication: Basic and Digest Access Authentication
-
-
Franks, J.1
Hallam-Baker, P.2
Hostetler, J.3
Lawrence, S.4
Leach, P.5
Luotonen, A.6
Stewart, L.7
-
2
-
-
81455130706
-
-
RFC 2831 (Proposed Standard), May [Online]. Available
-
P. Leach and C. Newman, "Using Digest Authentication as a SASL Mechanism," RFC 2831 (Proposed Standard), Internet Engineering Task Force, May 2000. [Online]. Available: http://www.ietf.org/rfc/rfc2831.txt
-
(2000)
Using Digest Authentication As a SASL Mechanism
-
-
Leach, P.1
Newman, C.2
-
3
-
-
0342395900
-
-
RFC 2222 (Proposed Standard), Oct. obsoleted by RFCs 4422, 4752, updated by RFC 2444. [Online]. Available
-
J. Myers, "Simple Authentication and Security Layer (SASL)," RFC 2222 (Proposed Standard), Internet Engineering Task Force, Oct. 1997, obsoleted by RFCs 4422, 4752, updated by RFC 2444. [Online]. Available: http://www.ietf.org/rfc/rfc2222.txt
-
(1997)
Simple Authentication and Security Layer (SASL)
-
-
Myers, J.1
-
5
-
-
0003602325
-
-
RFC 1321 (Informational), Apr. updated by RFC 6151. [Online]. Available
-
R. Rivest, "The MD5 Message-Digest Algorithm," RFC 1321 (Informational), Internet Engineering Task Force, Apr. 1992, updated by RFC 6151. [Online]. Available: http://www.ietf.org/rfc/rfc1321.txt
-
(1992)
The MD5 Message-Digest Algorithm
-
-
Rivest, R.1
-
6
-
-
84947934697
-
On the Security of Two MAC Algorithms
-
Advances in Cryptology - EUROCRYPT 96, ser. U. Maurer, Ed. Springer Berlin / Heidelberg
-
B. Preneel and P. van Oorschot, "On the Security of Two MAC Algorithms," in Advances in Cryptology - EUROCRYPT 96, ser. Lecture Notes in Computer Science, U. Maurer, Ed. Springer Berlin / Heidelberg, 1996, vol. 1070, pp. 19-32.
-
(1996)
Lecture Notes in Computer Science
, vol.1070
, pp. 19-32
-
-
Preneel, B.1
Van Oorschot, P.2
-
7
-
-
24944575304
-
Crypt-analysis of the Hash Functions MD4 and RIPEMD
-
Advances in Cryptology - EUROCRYPT 2005, ser. R. Cramer, Ed. Springer Berlin / Heidelberg
-
X. Wang, X. Lai, D. Feng, H. Chen, and X. Yu, "Crypt-analysis of the Hash Functions MD4 and RIPEMD," in Advances in Cryptology - EUROCRYPT 2005, ser. Lecture Notes in Computer Science, R. Cramer, Ed. Springer Berlin / Heidelberg, 2005, vol. 3494, pp. 551-551.
-
(2005)
Lecture Notes in Computer Science
, vol.3494
, pp. 551-551
-
-
Wang, X.1
Lai, X.2
Feng, D.3
Chen, H.4
Yu, X.5
-
8
-
-
24944591357
-
How to Break MD5 and Other Hash Functions
-
Advances in Cryptology - EUROCRYPT 2005, ser. R. Cramer, Ed. Springer Berlin / Heidelberg
-
X. Wang and H. Yu, "How to Break MD5 and Other Hash Functions," in Advances in Cryptology - EUROCRYPT 2005, ser. Lecture Notes in Computer Science, R. Cramer, Ed. Springer Berlin / Heidelberg, 2005, vol. 3494, pp. 561-561.
-
(2005)
Lecture Notes in Computer Science
, vol.3494
, pp. 561-561
-
-
Wang, X.1
Yu, H.2
-
9
-
-
33745171465
-
Finding Collisions in the Full SHA-1
-
Advances in Cryptology - CRYPTO 2005, ser. V. Shoup, Ed. Springer Berlin / Heidelberg
-
X. Wang, Y. Yin, and H. Yu, "Finding Collisions in the Full SHA-1," in Advances in Cryptology - CRYPTO 2005, ser. Lecture Notes in Computer Science, V. Shoup, Ed. Springer Berlin / Heidelberg, 2005, vol. 3621, pp. 17-36.
-
(2005)
Lecture Notes in Computer Science
, vol.3621
, pp. 17-36
-
-
Wang, X.1
Yin, Y.2
Yu, H.3
-
10
-
-
34548114558
-
Tunnels in Hash Functions: MD5 Collisions Within a Minute
-
ePrint Archive, Report 2006/105
-
V. Klima, "Tunnels in Hash Functions: MD5 Collisions Within a Minute," Cryptology ePrint Archive, Report 2006/105, 2006, http://eprint.iacr.org/.
-
(2006)
Cryptology
-
-
Klima, V.1
-
11
-
-
38149073454
-
Message Freedom in MD4 and MD5 Collisions: Application to APOP
-
Fast Software Encryption, ser. A. Biryukov, Ed. Springer Berlin / Heidelberg
-
G. Leurent, "Message Freedom in MD4 and MD5 Collisions: Application to APOP," in Fast Software Encryption, ser. Lecture Notes in Computer Science, A. Biryukov, Ed. Springer Berlin / Heidelberg, 2007, vol. 4593, pp. 309-328.
-
(2007)
Lecture Notes in Computer Science
, vol.4593
, pp. 309-328
-
-
Leurent, G.1
-
12
-
-
38149064346
-
Practical Password Recovery on an MD5 Challenge and Response
-
ePrint Archive, Report 2007/101
-
Y. Sasaki, G. Yamamoto, and K. Aoki, "Practical Password Recovery on an MD5 Challenge and Response," Cryptology ePrint Archive, Report 2007/101, 2007, http://eprint.iacr.org/.
-
(2007)
Cryptology
-
-
Sasaki, Y.1
Yamamoto, G.2
Aoki, K.3
-
13
-
-
43149097854
-
Security of MD5 Challenge and Response: Extension of APOP Password Recovery Attack
-
Topics in Cryptology - CT-RSA 2008, ser. T. Malkin, Ed. Springer Berlin / Heidelberg
-
Y. Sasaki, L. Wang, K. Ohta, and N. Kunihiro, "Security of MD5 Challenge and Response: Extension of APOP Password Recovery Attack," in Topics in Cryptology - CT-RSA 2008, ser. Lecture Notes in Computer Science, T. Malkin, Ed. Springer Berlin / Heidelberg, 2008, vol. 4964, pp. 1-18.
-
(2008)
Lecture Notes in Computer Science
, vol.4964
, pp. 1-18
-
-
Sasaki, Y.1
Wang, L.2
Ohta, K.3
Kunihiro, N.4
-
14
-
-
77951865221
-
Bit-Free Collision: Application to APOP Attack
-
Advances in Information and Computer Security, ser. T. Takagi and M. Mambo, Eds. Springer Berlin / Heidelberg
-
L. Wang, Y. Sasaki, K. Sakiyama, and K. Ohta, "Bit-Free Collision: Application to APOP Attack," in Advances in Information and Computer Security, ser. Lecture Notes in Computer Science, T. Takagi and M. Mambo, Eds. Springer Berlin / Heidelberg, 2009, vol. 5824, pp. 3-21.
-
(2009)
Lecture Notes in Computer Science
, vol.5824
, pp. 3-21
-
-
Wang, L.1
Sasaki, Y.2
Sakiyama, K.3
Ohta, K.4
-
15
-
-
81455157531
-
Fast Password Recovery Attack: Application to APOP
-
ePrint Archive, Report 2011/248
-
F. Liu, Y. Liu, T. Xie, and Y. Feng, "Fast Password Recovery Attack: Application to APOP," Cryptology ePrint Archive, Report 2011/248, 2011, http://eprint.iacr.org/.
-
(2011)
Cryptology
-
-
Liu, F.1
Liu, Y.2
Xie, T.3
Feng, Y.4
-
17
-
-
84979021449
-
Cryptographic Primitives for Information Authentication - State of the Art
-
State of the Art in Applied Cryptography, ser. Springer Berlin / Heidelberg
-
B. Preneel, "Cryptographic Primitives for Information Authentication - State of the Art," in State of the Art in Applied Cryptography, ser. Lecture Notes in Computer Science. Springer Berlin / Heidelberg, 1998, vol. 1528, pp. 49-104.
-
(1998)
Lecture Notes in Computer Science
, vol.1528
, pp. 49-104
-
-
Preneel, B.1
-
18
-
-
84985796089
-
Collisions for the compression function of MD5
-
Advances in Cryptology - EUROCRYPT 93, ser. T. Helleseth, Ed. Springer Berlin / Heidelberg
-
B. den Boer and A. Bosselaers, "Collisions for the compression function of MD5," in Advances in Cryptology - EUROCRYPT 93, ser. Lecture Notes in Computer Science, T. Helleseth, Ed. Springer Berlin / Heidelberg, 1994, vol. 765, pp. 293-304.
-
(1994)
Lecture Notes in Computer Science
, vol.765
, pp. 293-304
-
-
Den Boer, B.1
Bosselaers, A.2
-
19
-
-
58549103197
-
-
Master's thesis, TU Eindhoven, Faculty of Mathematics and Computer Science
-
M. Stevens, "On Collisions for MD5," Master's thesis, TU Eindhoven, Faculty of Mathematics and Computer Science, 2007.
-
(2007)
On Collisions for MD5
-
-
Stevens, M.1
-
20
-
-
70350346082
-
Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate
-
Advances in Cryptology - CRYPTO 2009, ser. S. Halevi, Ed. Springer Berlin / Heidelberg
-
M. Stevens, A. Sotirov, J. Appelbaum, A. Lenstra, D. Molnar, D. Osvik, and B. de Weger, "Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate," in Advances in Cryptology - CRYPTO 2009, ser. Lecture Notes in Computer Science, S. Halevi, Ed. Springer Berlin / Heidelberg, 2009, vol. 5677, pp. 55-69.
-
(2009)
Lecture Notes in Computer Science
, vol.5677
, pp. 55-69
-
-
Stevens, M.1
Sotirov, A.2
Appelbaum, J.3
Lenstra, A.4
Molnar, D.5
Osvik, D.6
De Weger, B.7
-
21
-
-
56549094743
-
A New Collision Differential for MD5 with Its Full Differential Path
-
ePrint Archive, Report 2008/230
-
T. Xie, D. Feng, and F. Liu, "A New Collision Differential For MD5 With Its Full Differential Path," Cryptology ePrint Archive, Report 2008/230, 2008, http://eprint.iacr.org/.
-
(2008)
Cryptology
-
-
Xie, T.1
Feng, D.2
Liu, F.3
-
22
-
-
81455130707
-
-
Could The 1-MSB Input Difference Be The Fastest Collision Attack For MD5 ? the poster session of EUROCRYPT 2009. Cryptology ePrint Archive, Report 2008/391
-
T. Xie, F. Liu, and D. Feng, "Could The 1-MSB Input Difference Be The Fastest Collision Attack For MD5 ?" LNCS 5479, the poster session of EUROCRYPT 2009. Cryptology ePrint Archive, Report 2008/391, 2008, http://eprint.iacr.org/.
-
(2008)
LNCS
, vol.5479
-
-
Xie, T.1
Liu, F.2
Feng, D.3
-
23
-
-
80051762753
-
How to Find Weak Input Differences for MD5 Collision Attacks
-
ePrint Archive, Report 2009/223
-
T. Xie and D. Feng, "How To Find Weak Input Differences For MD5 Collision Attacks," Cryptology ePrint Archive, Report 2009/223, 2009, http://eprint.iacr.org/.
-
(2009)
Cryptology
-
-
Xie, T.1
Feng, D.2
-
24
-
-
81455157535
-
Construct MD5 Collisions Using Just A Single Block of Message
-
ePrint Archive, Report 2010/643
-
-, "Construct MD5 Collisions Using Just A Single Block Of Message," Cryptology ePrint Archive, Report 2010/643, 2010, http://eprint.iacr.org/.
-
(2010)
Cryptology
-
-
Xie, T.1
Feng, D.2
-
25
-
-
81455157533
-
Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures
-
vol. In Press, Corrected Proof, pp.
-
Y. Yu, K. Li, W. Zhou, and P. Li, "Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures,"Journal of Network and Computer Applications, vol. In Press, Corrected Proof, pp. -, 2011.
-
(2011)
Journal of Network and Computer Applications
-
-
Yu, Y.1
Li, K.2
Zhou, W.3
Li, P.4
|