{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,29]],"date-time":"2025-03-29T16:23:01Z","timestamp":1743265381273},"reference-count":15,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2009,9,1]],"date-time":"2009-09-01T00:00:00Z","timestamp":1251763200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2019,1,18]],"date-time":"2019-01-18T00:00:00Z","timestamp":1547769600000},"content-version":"vor","delay-in-days":3426,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Digital Investigation"],"published-print":{"date-parts":[[2009,9]]},"DOI":"10.1016\/j.diin.2009.06.004","type":"journal-article","created":{"date-parts":[[2009,8,19]],"date-time":"2009-08-19T08:33:54Z","timestamp":1250670834000},"page":"S114-S120","source":"Crossref","is-referenced-by-count":13,"special_numbering":"S","title":["A novel time-memory trade-off method for password recovery"],"prefix":"10.1016","volume":"6","author":[{"given":"Vrizlynn L.L.","family":"Thing","sequence":"first","affiliation":[]},{"given":"Hwei-Ming","family":"Ying","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.diin.2009.06.004_bib14","author":"AccessData"},{"key":"10.1016\/j.diin.2009.06.004_bib2","author":"Cain and Abel"},{"key":"10.1016\/j.diin.2009.06.004_bib15","series-title":"Cryptography and data security","author":"Denning","year":"1982"},{"key":"10.1016\/j.diin.2009.06.004_bib9","doi-asserted-by":"crossref","unstructured":"Dobbertin H, Bosselaers A, Preneel B. Ripemd-160: a strengthened version of RIPEMD. In: Third international workshop on fast software encryption, lecture notes in computer science, vol. 1039; Apr 1996, pp. 71\u201382.","DOI":"10.1007\/3-540-60865-6_44"},{"key":"10.1016\/j.diin.2009.06.004_bib5","doi-asserted-by":"crossref","unstructured":"Hellman ME. A cryptanalytic time-memory trade-off. In: IEEE transaction on information theory, vol. IT-26(4); Jul. 1980, pp. 401\u2013406.","DOI":"10.1109\/TIT.1980.1056220"},{"key":"10.1016\/j.diin.2009.06.004_bib3","author":"John The Ripper"},{"key":"10.1016\/j.diin.2009.06.004_bib4","author":"LCPSoft"},{"key":"10.1016\/j.diin.2009.06.004_bib1","series-title":"Favorite passwords: \u201c1234\u201d and \u201cpassword\u201d","author":"Yahoo News","year":"2009"},{"key":"10.1016\/j.diin.2009.06.004_bib8","unstructured":"National Institute of Standards and Technology (NIST). Secure Hash Standard. In: Federal Information Processing Standards Publication 180-2; Aug 2002."},{"key":"10.1016\/j.diin.2009.06.004_bib13","unstructured":"National Institute of Standards and Technology (NIST). Secure Hash Standard. In: Federal Information Processing Standards Publication 180-1; Aug 1995."},{"key":"10.1016\/j.diin.2009.06.004_bib12","author":"Objectif S\u00e9curit\u00e9"},{"key":"10.1016\/j.diin.2009.06.004_bib10","first-page":"617","article-title":"Making a faster cryptanalytic time-memory trade-off","volume":"vol. 2729","author":"Oechslin","year":"2003"},{"key":"10.1016\/j.diin.2009.06.004_bib7","doi-asserted-by":"crossref","unstructured":"Rivest R. The MD5 message-digest algorithm. In: IETF RFC 1321; Apr 1992.","DOI":"10.17487\/rfc1321"},{"key":"10.1016\/j.diin.2009.06.004_bib11","author":"Shuanglei"},{"key":"10.1016\/j.diin.2009.06.004_bib6","series-title":"Mechanics of user identification and authentication: fundamentals of identity management","author":"Todorov","year":"2007"}],"container-title":["Digital Investigation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1742287609000462?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1742287609000462?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,1,18]],"date-time":"2019-01-18T11:03:30Z","timestamp":1547809410000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1742287609000462"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,9]]},"references-count":15,"alternative-id":["S1742287609000462"],"URL":"https:\/\/doi.org\/10.1016\/j.diin.2009.06.004","relation":{},"ISSN":["1742-2876"],"issn-type":[{"value":"1742-2876","type":"print"}],"subject":[],"published":{"date-parts":[[2009,9]]}}}