[1] |
Guo X,Chen H,Liu X,et al.The scale-free network of passwords: Visualization and estimation of empirical passwords[J].
|
|
arXiv:Cryptography and Security,2015.
|
[2] |
Wu Z Y,Chiang D L,Lin T C,et al.A reliable dynamic user-remote password authentication scheme over insecure network[C]∥Proc of the 26th International Conference on Advanced Information Network and Application,2012:25-28.
|
[3] |
Mazurek M L,Komanduri S,Vidas T,et al.Measuring password guessability for an entire university[C]∥Proc of the 2013 ACM SIGSAC Conference on Computer & Communications Security,2013:173-186.
|
[4] |
Jiang Feng. Research and implementation of cryptographic decryption platform based on distributed GPU [D].Beijing: Beijing University of Posts and Telecommunications,2013.(in Chinese)
|
[5] |
Liu Gong-shen, Qiu Wei-dong,Meng Kui,et al.Password vulnerability assessment and recovery based on rules mined from large-scale real data[J].Chinese Journal of Computer,2016,39(3):454-467.(in Chinese)
|
[6] |
Steube J. Hashcat advanved password recovery [EB/OL].[2019-05-18].https://hashcat.net/hashcat/.
|
[7] |
John the Ripper password cracker [EB/OL].[2019-05-18].http://www.openwall.com/john/doc/.
|
[8] |
Password cracking rules and masks for hashcat that I generated from cracked passwords [EB/OL].[2019-05-18].https://github:com/NSAKEY/nsa-rules.
|
[9] |
Das A,Bonneau J,Caesar M,et al.The tangled web of password reuse[C]∥Proc of Network and Distributed System Security Symposium,2014:1-15.
|
[10] |
Tatli E I.Cracking more password hashes with patterns[J].IEEE Transactions on Information Forensics & Security,2015,10(8):1656-1665.
|
[11] |
ElcomSoft distributed password recovery [EB/OL].[2019-05-18].https://www.elcomsoft.com/edpr.html.
|
[12] |
Melicher W,Ur B,Segreti S M,et al.Fast,lean,and accurate: Modeling password guessability using neural networks[C]
|
|
∥Proc of the 25 USENIX Conference on Security Symposium,2016:175-191.
|
[13] |
Ur B,Segreti S M,Bauer L,et al.Measuring real-world accuracies and biases in modeling password guessability [C]∥Proc of
|
|
the 24th USENIX Conference on Security Symposium, 2015:463-481.
|
[14] |
de Carnavalet X D C, Mannan M.From very weak to very strong: Analyzing password-strength meters[C]∥Proc of Network and Distributed System Security Symposium,2014:1-16.
|
[15] |
Zynq-7000 all programmable SoC [EB/OL].[2019-05-18].https://www.xilinx.com/support/documentation/product-briefs/zynq-7000-product-brief.pdf.
|
|
附中文参考文献:
|
[4] |
姜峰.基于分布式GPU密码破译平台的研究与实现[D].北京:北京邮电大学,2013.
|
[5] |
刘功申,邱卫东,孟魁,等.基于真实数据挖掘的口令脆弱性评估及恢复[J].计算机学报,2016,39(3):454-467.
|