메뉴 건너뛰기




Volumn , Issue , 2012, Pages 81-96

I forgot your password: Randomness attacks against PHP applications∗

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; ENTROPY; LINEAR SYSTEMS; ONLINE SYSTEMS;

EID: 84910678443     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (15)

References (17)
  • 2
    • 85076203232 scopus 로고    scopus 로고
    • Openssl random pseudo bytes() painfully slow
    • Unknown Author
    • Unknown Author. openssl random pseudo bytes() painfully slow. PHP Bug # 51636, https://bugs.php.net/bug.php?id=51636, 2010.
    • (2010) PHP Bug # 51636
  • 3
    • 26444449872 scopus 로고    scopus 로고
    • On stern’s attack against secret truncated linear congruential generators
    • Colin Boyd and Juan Manuel González Nieto, editors, Springer
    • Scott Contini and Igor Shparlinski. On stern’s attack against secret truncated linear congruential generators. In Colin Boyd and Juan Manuel González Nieto, editors, ACISP, volume 3574 of Lecture Notes in Computer Science, pages 52–60. Springer, 2005.
    • (2005) ACISP, Volume 3574 of Lecture Notes in Computer Science , pp. 52-60
    • Contini, S.1    Shparlinski, I.2
  • 5
    • 84910650506 scopus 로고    scopus 로고
    • Lesser known security problems in php applications
    • Stefan Esser. Lesser known security problems in php applications. In Zend Conference, 2008.
    • (2008) Zend Conference
    • Esser, S.1
  • 7
    • 0022793132 scopus 로고
    • How to construct random functions
    • Oded Goldreich, Shafi Goldwasser, and Silvio Micali. How to construct random functions. J. ACM, 33(4):792–807, 1986.
    • (1986) J. ACM , vol.33 , Issue.4 , pp. 792-807
    • Goldreich, O.1    Goldwasser, S.2    Micali, S.3
  • 8
    • 0021975313 scopus 로고
    • The cryptographic security of truncated linearly related variables
    • Robert Sedgewick, editor, ACM
    • Johan Håstad and Adi Shamir. The cryptographic security of truncated linearly related variables. In Robert Sedgewick, editor, STOC, pages 356–362. ACM, 1985.
    • (1985) STOC , pp. 356-362
    • Håstad, J.1    Shamir, A.2
  • 9
    • 85076201335 scopus 로고    scopus 로고
    • Economics of password cracking in the GPU era
    • Robert”Hackajar” Imhoff-Dousharm. Economics of password cracking in the gpu era. In DEFCON 19, 2011.
    • (2011) DEFCON , vol.19
    • Robert”Hackajar1    Imhoff-Dousharm2
  • 10
    • 84910635690 scopus 로고    scopus 로고
    • PHPWN: Attacking sessions and pseudo-random numbers in php
    • Las Vegas, NV 2010
    • Samy Kamkar. phpwn: Attacking sessions and pseudo-random numbers in php. In Blackhat USA, Las Vegas, NV 2010, 2010.
    • (2010) Blackhat USA
    • Kamkar, S.1
  • 12
    • 84958953465 scopus 로고    scopus 로고
    • Segment lll-reduction of lattice bases
    • Joseph H. Silverman, editor, Springer
    • Henrik Koy and Claus-Peter Schnorr. Segment lll-reduction of lattice bases. In Joseph H. Silverman, editor, CaLC, volume 2146 of Lecture Notes in Computer Science, pages 67–80. Springer, 2001.
    • (2001) CaLC, Volume 2146 of Lecture Notes in Computer Science , pp. 67-80
    • Koy, H.1    Schnorr, C.-P.2
  • 13
    • 34250244723 scopus 로고
    • Factoring polynomials with rational coefficients
    • A.K. Lenstra, H.W.jun. Lenstra, and Lászlo Lovász. Factoring polynomials with rational coefficients. Math. Ann., 261:515–534, 1982.
    • (1982) Math. Ann. , vol.261 , pp. 515-534
    • Lenstra, A.K.1    jun Lenstra, H.W.2    Lovász, L.3
  • 15
    • 0031599142 scopus 로고    scopus 로고
    • Mersenne twister: A 623-dimensionally equidistributed uniform pseudo-random number generator
    • Makoto Matsumoto and Takuji Nishimura. Mersenne twister: A 623-dimensionally equidistributed uniform pseudo-random number generator. ACM Trans. Model. Comput. Simul., 8(1):3–30, 1998.
    • (1998) ACM Trans. Model. Comput. Simul. , vol.8 , Issue.1 , pp. 3-30
    • Matsumoto, M.1    Nishimura, T.2
  • 16
    • 85076224135 scopus 로고    scopus 로고
    • Tactical exploitation
    • HD Moore and Valsmith. Tactical exploitation. In DEFCON 15, 2007.
    • (2007) DEFCON , vol.15
    • Moore, H.D.1    Valsmith2
  • 17
    • 0023576573 scopus 로고
    • Secret linear congruential generators are not cryptographically secure
    • IEEE Computer Society
    • Jacques Stern. Secret linear congruential generators are not cryptographically secure. In FOCS, pages 421–426. IEEE Computer Society, 1987.
    • (1987) FOCS , pp. 421-426
    • Stern, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.