[1] 柏银,李志蜀,朱兴东,等. MD5算法及其在远程身份认证中的应用[J]. 四川大学学报(自然科学版),2006,43(2):305-309.
BAI Y,LI Z S,ZHU X D. MD5 algorithm and the application in distanced-identity authentication[J]. Journal of Sichuan university(natural science edition),2006,43(2):305-309.(in Chinese)
[2] WANG X Y. How to break MD5 and other hash functions[J]. Lecture notes in computer science,2005,3 494:19-35.
[3] 毛熠,陈娜. MD5算法的研究与改进[J]. 计算机工程,2012(24):111-114.
MAO Y,CHEN N. Research and improvement of MD5 algorithm[J]. Computer engineering,2012(24):111-114.(in Chinese)
[4] LIU F B,LIU Y,XIE T,et al. Fast password recovery attack:application to APOP[J]. Journal of intelligent manufacturing,2014,25(2):251-261.
[5] WANG L,OHTA K,SASAKI Y,et al. Cryptanalysis of two MD5-based authentication protocols:APOP and NMAC[J]. IEICE transactions on information and systems,2010,E93/D(5):1 087-1 095.
[6] 周林,曾伟,徐良华. MD5差分攻击算法在FPGA上的实现技术[J]. 保密科学技术,2012(4):69-73.
ZHOU L,ZENG W,XU L H. Implementation technology of MD5 differential attack algorithm on FPGA[J]. Secrecy science and technology,2012(4):69-73.(in Chinese)
[7] WANG X M. Digital signature scheme based on error-correcting codes[J]. IEEE electronics letters,1990,26(13):898-899.
[8] WANG X M. Modification of the digital signature scheme based on error-correcting codes[J]. Acta electronica sinica,2000,28(2):110-112.
[9] 钱建发. 纠错码理论及应用研究[D]. 西安:西安电子科技大学,2010.
QIAN J F. Research on theory and application of error-correcting codes[D]. Xi’an:Xidian University,2010.(in Chinese)
[10] 冯克勤. 纠错码的代数理论[M]. 北京:清华大学出版社,2005.
FENG K Q. Algebraic theory of error-correcting codes[M]. Beijing:Tsinghua University Press,2005.(in Chinese)