Tài liệu tham khảo |
Loại |
Chi tiết |
[1] Hoàng Xuân Dậu, “An toàn bảo mật hệ thống thông tin”, 2017.TIẾNG ANH |
Sách, tạp chí |
Tiêu đề: |
An toàn bảo mật hệ thống thông tin |
|
[1] J. Luis, G. Pardo, and C. Gómez-rodríguez, “The SHA-3 Family of Cryptographic Hash Functions and Extendable-Output Functions”, 2015 |
Sách, tạp chí |
Tiêu đề: |
The SHA-3 Family of CryptographicHash Functions and Extendable-Output Functions |
|
[2] M. Gebhardt, G. Illies, and W. Schindler, “A Note on the Practical Value of Single Hash Collisions for Special File Formats”, NIST First Cryptographic Hash Workshop, October/November, 2005 |
Sách, tạp chí |
Tiêu đề: |
A Note on the Practical Value of SingleHash Collisions for Special File Formats |
|
[3] M. Stevens, “On collisions for MD5”, Master thesis, Eindhoven University of Technology, Eindhoven, Netherlands, 2007 |
Sách, tạp chí |
Tiêu đề: |
On collisions for MD5 |
|
[4] N. H. Function, “Description of SHA-256, SHA-384 AND SHA-512”, Www.Iwar.Org.Uk/Comsec/Resources/Cipher/Sha256-384-512.Pdf, pp. 1–50, 2004 |
Sách, tạp chí |
Tiêu đề: |
Description of SHA-256, SHA-384 AND SHA-512”,"Www.Iwar.Org.Uk/Comsec/Resources/Cipher/Sha256-384-512.Pdf |
|
[5] S. Manuel and T. Peyrin, “Collisions on SHA-0 in one hour”, Lect. Notes Comput.Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol.5086 LNCS, pp. 16–35, 2008 |
Sách, tạp chí |
Tiêu đề: |
Collisions on SHA-0 in one hour”, "Lect. Notes Comput."Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics) |
|
[6] W. Penard and T. van Werkhoven, “On the Secure Hash Algorithm family,” p. 17, 2008 |
Sách, tạp chí |
Tiêu đề: |
On the Secure Hash Algorithm family |
|
[7] W. Stallings, Cryptography and network security principles and practice, 5th ed., vol. 139, no. 3, 2011 |
Sách, tạp chí |
Tiêu đề: |
Cryptography and network security principles and practice |
|
[8] X. Wang, Y. L. Yin, and H. Yu, “Finding Collisions in the Full SHA-1,” no.90304009, pp. 17–36, 2005.WEBSITE |
Sách, tạp chí |
Tiêu đề: |
Finding Collisions in the Full SHA-1 |
|
[1] Alex, “How to identify hash types – new tools with modern hashes support”, 2021.[Online]. Available: https://miloserdov.org/?p=6474. [Accessed: 18-Dec-2021] |
Sách, tạp chí |
Tiêu đề: |
How to identify hash types – new tools with modern hashes support |
|
[2] B. Schneier, “Cryptanalysis of SHA-1 - Schneier on Security”. [Online]. Available:https://www.schneier.com/blog/archives/2005/02/cryptanalysis_o.html. [Accessed:19-Dec-2021] |
Sách, tạp chí |
Tiêu đề: |
Cryptanalysis of SHA-1 - Schneier on Security |
|
[3] Digital Sleuth và các cộng sự, “Name That Hash”. [Online]. Available:https://github.com/HashPals/Name-That-Hash. [Accessed: 18-Dec-2021] |
Sách, tạp chí |
|
[4] Do Son, “Name-That-Hash v1.10 releases: The Modern Hash Identification System”. [Online]. Available: https://securityonline.info/name-that-hash-the-modern-hash-identification-system/. [Accessed: 18-Dec-2021] |
Sách, tạp chí |
Tiêu đề: |
Name-That-Hash v1.10 releases: The Modern Hash IdentificationSystem |
|
[5] Homebrew Formulae. [Online]. Available: https://formulae.brew.sh/formula/name-that-hash. [Accessed: 20-Dec-2021] |
Link |
|