{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:02:32Z","timestamp":1767337352113},"publisher-location":"New York, NY","reference-count":13,"publisher":"Springer New York","isbn-type":[{"type":"print","value":"9780387973173"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/0-387-34805-0_6","type":"book-chapter","created":{"date-parts":[[2007,11,9]],"date-time":"2007-11-09T02:05:53Z","timestamp":1194573953000},"page":"44-63","source":"Crossref","is-referenced-by-count":54,"title":["UNIX Password Security - Ten Years Later"],"prefix":"10.1007","author":[{"given":"David C.","family":"Feldmeier","sequence":"first","affiliation":[]},{"given":"Philip R.","family":"Karn","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","unstructured":"Robert W. Baldwin. MIT fdes 5 (crypt) source code."},{"issue":"3","key":"6_CR2","first-page":"221","volume":"1","author":"M. Bishop","year":"1988","unstructured":"Matt Bishop. An application of a fast data encryption standard implementation. Computing Systems, 1(3):221\u2013254, Summer 1988.","journal-title":"Computing Systems"},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"Marc Davio, Yvo Desmedt, Marc Fosseprez, Rene Govaerts, Jan Hulsbosch, Patrik Neutjens, Philippe Piiet, Jean-Jacques Quisquater, Joos Vandewalle, and Pascal Wouters. Analytical characteristics of the DES. In Proceedings of Crypto\u2019 83, pages 171\u2013202, August 1983.","DOI":"10.1007\/978-1-4684-4730-9_16"},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Marc Davio, Yvo Desmedt, Jo Goubert, Frank Hoornaert, and Jean-Jacques Quisquater. Efficient hardware and software implementations for the DES. In Proceedings of Crypto\u2019 84, pages 144\u2013146, August 1984.","DOI":"10.1007\/3-540-39568-7_14"},{"issue":"6","key":"6_CR5","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1109\/C-M.1977.217750","volume":"10","author":"W. Diffie","year":"1977","unstructured":"W. Diffie and M. E. Hellman. Exhaustive cryptanalysis of the NBS data encryption standard. Computer, 10(6):74\u201384, June 1977.","journal-title":"Computer"},{"key":"6_CR6","unstructured":"Alan G. Konheim. Cryptography: A Primer. John Wiley & Sons, 1981."},{"key":"6_CR7","unstructured":"T. Matsumoto, K. Kato, and H. Imai. Speeding up secret computations with insecure auxiliary devices. In Proceedings of Crypto\u2019 88, August 1988."},{"key":"6_CR8","unstructured":"Donald Mitchell. AT&T Questor (crypt) source code."},{"issue":"11","key":"6_CR9","doi-asserted-by":"publisher","first-page":"594","DOI":"10.1145\/359168.359172","volume":"22","author":"R. Morris","year":"1979","unstructured":"Robert Morris and Ken Thompson. Password security: A case history. Communications of the ACM, 22(11):594\u2013597, November 1979.","journal-title":"Communications of the ACM"},{"key":"6_CR10","unstructured":"Charles P. Pfleeger. Security in Computing. Prentice Hall, 1989."},{"issue":"1","key":"6_CR11","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1002\/j.1538-7305.1951.tb01366.x","volume":"30","author":"C. Shannon","year":"1951","unstructured":"Claude Shannon. Prediction and entropy of printed english. Bell System Technical Journal, 30(1):50\u201364, January 1951.","journal-title":"Bell System Technical Journal"},{"issue":"1","key":"6_CR12","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1145\/66093.66095","volume":"19","author":"E. H. Spafford","year":"1989","unstructured":"Eugene H. Spafford. The internet worm program: An analysis. Computer Communication Review, 19(1):17\u201357, January 1989.","journal-title":"Computer Communication Review"},{"key":"6_CR13","unstructured":"J.G. Steiner, C. Neuman, and J.I. Schiller. Kerberos: An authentication service for open network systems. In USENIX Conference Proceedings, pages 191\u2013202, Dallas, Texas, February 1988."}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO\u2019 89 Proceedings"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/0-387-34805-0_6.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T05:28:33Z","timestamp":1619501313000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/0-387-34805-0_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387973173"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/0-387-34805-0_6","relation":{},"subject":[]}}