{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T19:16:49Z","timestamp":1730315809380,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,3,24]]},"DOI":"10.1145\/2016039.2016072","type":"proceedings-article","created":{"date-parts":[[2011,8,10]],"date-time":"2011-08-10T16:16:32Z","timestamp":1312992992000},"page":"103-108","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["The security of cryptographic hashes"],"prefix":"10.1145","author":[{"given":"Chad","family":"Teat","sequence":"first","affiliation":[{"name":"Lead System Administrator, Hewlett Packard Enterprise Services, Athens, GA"}]},{"given":"Svetlana","family":"Peltsverger","sequence":"additional","affiliation":[{"name":"Southern Polytechnic State University, Marietta, GA"}]}],"member":"320","published-online":{"date-parts":[[2011,3,24]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Golubev I. About Cpu and gpu usage for password recovery. http:\/\/www.golubev.com\/about_cpu_and_gpu_2_en.htm Retrieved on February 16 2010 Golubev I. About Cpu and gpu usage for password recovery. http:\/\/www.golubev.com\/about_cpu_and_gpu_2_en.htm Retrieved on February 16 2010"},{"key":"e_1_3_2_1_2_1","first-page":"1","volume":"2002","author":"Smith R.","unstructured":"Smith , R. Authentication :From Passwords to Public Keys. Boston : Addison-Wesley , 2002 pp. 1 -- 14 . Smith, R. Authentication:From Passwords to Public Keys. Boston: Addison-Wesley, 2002 pp. 1--14.","journal-title":"Addison-Wesley"},{"key":"e_1_3_2_1_3_1","volume-title":"Applied Cryptography","author":"Schneier B.","year":"1996","unstructured":"Schneier , B. Applied Cryptography . New York : Wiley , 1996 . Schneier, B. Applied Cryptography. New York: Wiley, 1996."},{"key":"e_1_3_2_1_4_1","first-page":"12","volume":"200","author":"Md","unstructured":"Md 5 vulnerable to collision attacks. US- CERT , 200 8- 12 - 30 Retrieved from http:\/\/www.kb.cert.org\/vuls\/id\/836068 Md5 vulnerable to collision attacks. US-CERT, 2008-12-30 Retrieved from http:\/\/www.kb.cert.org\/vuls\/id\/836068","journal-title":"CERT"},{"key":"e_1_3_2_1_5_1","volume-title":"Practical Cryptography","author":"Ferguson N.","year":"2003","unstructured":"Ferguson , N. , Schneier , B.. Practical Cryptography . New York : Wiley , 2003 Ferguson, N., Schneier, B.. Practical Cryptography. New York: Wiley, 2003"},{"key":"e_1_3_2_1_6_1","volume-title":"http:\/\/www.eia.doe.gov\/cneaf\/electricity\/epm\/table5_6_a.html. Retrieved on","author":"Electric","year":"2010","unstructured":"Electric power monthly. http:\/\/www.eia.doe.gov\/cneaf\/electricity\/epm\/table5_6_a.html. Retrieved on March 15, 2010 Electric power monthly. http:\/\/www.eia.doe.gov\/cneaf\/electricity\/epm\/table5_6_a.html. Retrieved on March 15, 2010"},{"key":"e_1_3_2_1_7_1","volume-title":"http:\/\/aws.amazon.com\/ec2\/ Retrieved on","author":"Amazon","year":"2010","unstructured":"Amazon elastic compute cloud. http:\/\/aws.amazon.com\/ec2\/ Retrieved on February 26, 2010 Amazon elastic compute cloud. http:\/\/aws.amazon.com\/ec2\/ Retrieved on February 26, 2010"},{"key":"e_1_3_2_1_8_1","volume-title":"January 28","author":"O'Brien T.","year":"2009","unstructured":"O'Brien , T. (). What is the Conficker virus and should you be worried? http:\/\/www.switched.com\/2009\/01\/28\/what-is-the-conflicker-virus-and-should-you-be-worried\/ Switched , January 28 , 2009 . O'Brien, T. (). What is the Conficker virus and should you be worried? http:\/\/www.switched.com\/2009\/01\/28\/what-is-the-conflicker-virus-and-should-you-be-worried\/ Switched, January 28, 2009."},{"key":"e_1_3_2_1_9_1","volume-title":"http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-63\/SP800-63V1_0_2.pdf. NIST Special Publication, 800--63","author":"Electronic","year":"2006","unstructured":"Electronic authentication guide. http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-63\/SP800-63V1_0_2.pdf. NIST Special Publication, 800--63 , 2006 . Electronic authentication guide. http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-63\/SP800-63V1_0_2.pdf. NIST Special Publication, 800--63, 2006."},{"key":"e_1_3_2_1_10_1","unstructured":"Allan F Seng T & Saygo A. Do and don'ts for p@\u00bfw0rd$. http:\/\/blogs.technet.com\/mmpc\/archive\/2009\/11\/27\/do-and-don-ts-for-p-w0rd.aspx November 27 2009. Allan F Seng T & Saygo A. Do and don'ts for p@\u00bfw0rd$ . http:\/\/blogs.technet.com\/mmpc\/archive\/2009\/11\/27\/do-and-don-ts-for-p-w0rd.aspx November 27 2009."},{"key":"e_1_3_2_1_11_1","volume-title":"http:\/\/iase.disa.mil\/stigs\/stig\/ Retrieved on","author":"Security","year":"2010","unstructured":"Security technical implementation guides. http:\/\/iase.disa.mil\/stigs\/stig\/ Retrieved on January 10, 2010 . Security technical implementation guides. http:\/\/iase.disa.mil\/stigs\/stig\/ Retrieved on January 10, 2010."},{"key":"e_1_3_2_1_12_1","volume-title":"National Archives and Records Administration, 75(2) http:\/\/edocket.access.gpo.gov\/2010\/pdf\/E9-31418.pdf","author":"Federal","year":"2010","unstructured":"Federal register. National Archives and Records Administration, 75(2) http:\/\/edocket.access.gpo.gov\/2010\/pdf\/E9-31418.pdf 2010 . Federal register. National Archives and Records Administration, 75(2) http:\/\/edocket.access.gpo.gov\/2010\/pdf\/E9-31418.pdf 2010."}],"event":{"name":"ACM SE '11: ACM Southeast Regional Conference","sponsor":["ACM Association for Computing Machinery"],"location":"Kennesaw Georgia","acronym":"ACM SE '11"},"container-title":["Proceedings of the 49th Annual Southeast Regional Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2016039.2016072","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,6]],"date-time":"2023-01-06T06:38:31Z","timestamp":1672987111000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2016039.2016072"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,3,24]]},"references-count":12,"alternative-id":["10.1145\/2016039.2016072","10.1145\/2016039"],"URL":"https:\/\/doi.org\/10.1145\/2016039.2016072","relation":{},"subject":[],"published":{"date-parts":[[2011,3,24]]},"assertion":[{"value":"2011-03-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}