1. Cryptographic hash-function basics: Definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance;Rogaway,2004
2. Gershon Kedem, Yuriko Ishihara, Brute force attack on {UNIX} passwords with {SIMD} computer, in: 8th USENIX Security Symposium (USENIX Security 99), 1999.
3. Using fpgas to parallelize dictionary attacks for password cracking;Dandass,2008
4. A cryptanalytic time-memory trade-off;Hellman;IEEE Trans. Inform. Theory,1980
5. Cryptography and Data Security;Denning,1982