{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,2,29]],"date-time":"2024-02-29T06:03:49Z","timestamp":1709186629199},"reference-count":14,"publisher":"International Academy Publishing (IAP)","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JSW"],"published-print":{"date-parts":[[2015,2]]},"DOI":"10.17706\/jsw.10.2.116-126","type":"journal-article","created":{"date-parts":[[2015,9,18]],"date-time":"2015-09-18T09:17:16Z","timestamp":1442567836000},"page":"116-126","source":"Crossref","is-referenced-by-count":3,"title":["On the Security Analysis of PBKDF2 in OpenOffice"],"prefix":"10.17706","volume":"10","author":[{"given":"Xiaochao","family":"Li","sequence":"first","affiliation":[]},{"given":"Cuicui","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Kun","family":"Pan","sequence":"additional","affiliation":[]},{"given":"Shuqiang","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Xiurong","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Benbin","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Deguang","family":"Le","sequence":"additional","affiliation":[]},{"given":"Donghui","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Xiaochao","family":"Li","sequence":"additional","affiliation":[]}],"member":"7163","reference":[{"issue":"8","key":"ref1","first-page":"101","article-title":"Security analysis of key derivation function in file authentication scheme.","volume":"38","author":"Zou","year":"2012","unstructured":"[1] Zou, M., Wu, H. W., Zhou, J., & Li, X. C. (2012, April). Security analysis of key derivation function in file authentication scheme. Journal of Computer Engineering, 38(8), 101-104.","journal-title":"Journal of Computer Engineering"},{"key":"ref2","doi-asserted-by":"crossref","DOI":"10.1201\/9781420010756","volume-title":"Introduction to Modern Cryptography","author":"Katz","year":"2007","unstructured":"[2] Katz, J., & Lindell, Y. (2007). Introduction to Modern Cryptography: Principles and Protocols. CRC Press."},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.4304\/jcp.8.9.2262-2268"},{"key":"ref4","first-page":"245","volume-title":"Design and analysis of password-based key derivation functions Proceedings of Topics in Cryptology \u2014 CT-RSA 2005","volume":"3376","author":"Frances","year":"2005","unstructured":"[6] Frances, F., Yao, Y. Q., & Yin, L. (2005). Design and analysis of password-based key derivation functions. Proceedings of Topics in Cryptology \u2014 CT-RSA 2005, Lecture Notes in Computer Science, 3376 (pp. 245-261). San Francisco, CA, USA."},{"key":"ref5","first-page":"132","article-title":"Recommendation for password-based key derivation.","volume":"800","author":"Turan","year":"2010","unstructured":"[7] Turan, M. S., et al. (2010). Recommendation for password-based key derivation. NIST Special Publication, 800, 132.","journal-title":"NIST Special Publication"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14623-7_34"},{"key":"ref7","first-page":"108","article-title":"Recommendation for key derivation using pseudorandom functions.","volume":"800","author":"Chen","year":"2008","unstructured":"[10] Chen, L. (2008). Recommendation for key derivation using pseudorandom functions. NIST Special Publication, 800, 108.","journal-title":"NIST Special Publication"},{"issue":"1","key":"ref8","first-page":"19","article-title":"Open document format for office applications (OpenDocument) v1.2. OASIS Standard","volume":"10","author":"Wheeler","year":"2011","unstructured":"[11] Wheeler, D., Durusau, P., Rathke, E., & Weir, R. (2011). Open document format for office applications (OpenDocument) v1.2. OASIS Standard, Oasis, 10(1), 19-28.","journal-title":"Oasis"},{"key":"ref9","volume-title":"Design and Analysis of Block Cipher","author":"Wu","year":"2009","unstructured":"[12] Wu, W. L., Feng, D. G., & Zhang, W. T. (2009). Design and Analysis of Block Cipher (2nd ed.). Beijing: Tsinghua Press."},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/11818175_36"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29101-2_14"},{"key":"ref12","first-page":"118","article-title":"Guide to enterprise password management (draft).","volume":"800","author":"Scarfone","year":"2009","unstructured":"[16] Scarfone, K., & Souppaya, M. (2009). Guide to enterprise password management (draft). NIST, 800, 118.","journal-title":"NIST"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICASID.2012.6325279"},{"key":"ref14","volume-title":"Programming guide 5 0","author":"Cuda","year":"2013","unstructured":"[19] Cuda, C. (2013). Programming guide 5.0. NVIDIA Corporation."}],"container-title":["Journal of Software"],"original-title":["On the Security Analysis of PBKDF2 in OpenOffice"],"link":[{"URL":"http:\/\/www.jsoftware.us\/vol10\/11-jsw131126-1012.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,30]],"date-time":"2019-08-30T18:09:23Z","timestamp":1567188563000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.jsoftware.us\/index.php?m=content&c=index&a=show&catid=149&id=2031"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,2]]},"references-count":14,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2015,2]]}},"URL":"https:\/\/doi.org\/10.17706\/jsw.10.2.116-126","relation":{},"ISSN":["1796-217X"],"issn-type":[{"value":"1796-217X","type":"print"}],"subject":[],"published":{"date-parts":[[2015,2]]}}}