{"id":"https://openalex.org/W2066346924","doi":"https://doi.org/10.4304/jcp.8.9.2262-2268","title":"The Security of Key Derivation Functions in WINRAR","display_name":"The Security of Key Derivation Functions in WINRAR","publication_year":2013,"publication_date":"2013-09-01","ids":{"openalex":"https://openalex.org/W2066346924","doi":"https://doi.org/10.4304/jcp.8.9.2262-2268","mag":"2066346924"},"language":"en","primary_location":{"id":"doi:10.4304/jcp.8.9.2262-2268","is_oa":false,"landing_page_url":"https://doi.org/10.4304/jcp.8.9.2262-2268","pdf_url":null,"source":{"id":"https://openalex.org/S77894049","display_name":"Journal of Computers","issn_l":"1796-203X","issn":["1796-203X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318660","host_organization_name":"Academy Publisher","host_organization_lineage":["https://openalex.org/P4310318660"],"host_organization_lineage_names":["Academy Publisher"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computers","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100333005","display_name":"Jie Chen","orcid":"https://orcid.org/0000-0003-2449-9793"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Jie Chen","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101813420","display_name":"Jun Zhou","orcid":"https://orcid.org/0000-0001-8684-3065"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jun Zhou","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068517224","display_name":"Kun Pan","orcid":"https://orcid.org/0000-0003-0782-198X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Kun Pan","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5019761887","display_name":"Shuqiang Lin","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Shuqiang Lin","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102856219","display_name":"Cuicui Zhao","orcid":"https://orcid.org/0000-0002-7690-807X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Cuicui Zhao","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5063940644","display_name":"Xiaochao Li","orcid":"https://orcid.org/0000-0001-7469-7064"},"institutions":[{"id":"https://openalex.org/I191208505","display_name":"Xiamen University","ror":"https://ror.org/00mcjh785","country_code":"CN","type":"education","lineage":["https://openalex.org/I191208505"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaochao Li","raw_affiliation_strings":["Xiamen University"],"affiliations":[{"raw_affiliation_string":"Xiamen University","institution_ids":["https://openalex.org/I191208505"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5100333005"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.5443,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.70947506,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"8","issue":"9","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9919000267982483,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7808392643928528},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.7792365550994873},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5820881128311157},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.556515634059906},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5342207551002502},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.5194187164306641},{"id":"https://openalex.org/keywords/one-time-password","display_name":"One-time password","score":0.480704128742218},{"id":"https://openalex.org/keywords/function","display_name":"Function (biology)","score":0.4537111520767212},{"id":"https://openalex.org/keywords/zero-knowledge-password-proof","display_name":"Zero-knowledge password proof","score":0.4481656551361084},{"id":"https://openalex.org/keywords/core","display_name":"Core (optical fiber)","score":0.43424761295318604},{"id":"https://openalex.org/keywords/s/key","display_name":"S/KEY","score":0.4257308840751648},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.39302006363868713},{"id":"https://openalex.org/keywords/password-policy","display_name":"Password policy","score":0.39189404249191284}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7808392643928528},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.7792365550994873},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5820881128311157},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.556515634059906},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5342207551002502},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.5194187164306641},{"id":"https://openalex.org/C89479133","wikidata":"https://www.wikidata.org/wiki/Q1137840","display_name":"One-time password","level":3,"score":0.480704128742218},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.4537111520767212},{"id":"https://openalex.org/C188615804","wikidata":"https://www.wikidata.org/wiki/Q8069448","display_name":"Zero-knowledge password proof","level":5,"score":0.4481656551361084},{"id":"https://openalex.org/C2164484","wikidata":"https://www.wikidata.org/wiki/Q5170150","display_name":"Core (optical fiber)","level":2,"score":0.43424761295318604},{"id":"https://openalex.org/C4957475","wikidata":"https://www.wikidata.org/wiki/Q242186","display_name":"S/KEY","level":3,"score":0.4257308840751648},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.39302006363868713},{"id":"https://openalex.org/C98705547","wikidata":"https://www.wikidata.org/wiki/Q3394687","display_name":"Password policy","level":4,"score":0.39189404249191284},{"id":"https://openalex.org/C78458016","wikidata":"https://www.wikidata.org/wiki/Q840400","display_name":"Evolutionary biology","level":1,"score":0.0},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.4304/jcp.8.9.2262-2268","is_oa":false,"landing_page_url":"https://doi.org/10.4304/jcp.8.9.2262-2268","pdf_url":null,"source":{"id":"https://openalex.org/S77894049","display_name":"Journal of Computers","issn_l":"1796-203X","issn":["1796-203X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318660","host_organization_name":"Academy Publisher","host_organization_lineage":["https://openalex.org/P4310318660"],"host_organization_lineage_names":["Academy Publisher"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computers","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6100000143051147,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W119362848","https://openalex.org/W1482123743","https://openalex.org/W2163923040","https://openalex.org/W2167606175","https://openalex.org/W2362961371","https://openalex.org/W2404275717","https://openalex.org/W4300349690"],"related_works":["https://openalex.org/W2359085393","https://openalex.org/W2969720675","https://openalex.org/W2387329106","https://openalex.org/W4283835082","https://openalex.org/W2526316819","https://openalex.org/W2177391373","https://openalex.org/W1970072309","https://openalex.org/W2953105088","https://openalex.org/W4214857854","https://openalex.org/W2118366631"],"abstract_inverted_index":{"In":[0,31],"various":[1],"versions":[2,112],"of":[3,26,36,56,71,102],"WINRAR,":[4],"the":[5,24,27,34,40,48,53,57,61,65,68,72,81,100,108],"file":[6,42],"security":[7,29,35],"is":[8,23,104],"mainly":[9],"protected":[10],"by":[11,47],"user":[12],"authentication":[13],"and":[14,39,94,110],"files":[15,75],"encryption.":[16],"Password":[17],"based":[18],"key":[19],"derivation":[20],"function":[21],"(PBKDF)":[22],"core":[25],"WINRAR":[28,44,73,109],"mechanism.":[30],"this":[32],"paper,":[33],"PBKDF":[37],"algorithm":[38],"encrypted":[41,74],"in":[43],"are":[45,113],"analyzed":[46],"Game-Playing":[49],"approach.":[50],"We":[51],"show":[52],"upper":[54],"boundary":[55],"Adversary\u2019s":[58],"Advantage":[59],"over":[60],"random":[62],"function.":[63],"With":[64],"theoretical":[66],"derivation,":[67],"actual":[69],"safety":[70],"has":[76],"been":[77],"discussed.":[78],"According":[79],"to":[80],"latest":[82],"developments":[83],"for":[84],"GPU-based":[85],"exhaustive":[86],"password":[87,103],"search":[88],"attacks,":[89],"we":[90],"do":[91],"some":[92],"experiments":[93],"draw":[95],"a":[96],"conclusion":[97],"that":[98],"if":[99],"length":[101],"longer":[105],"than":[106],"6,":[107],"later":[111],"secure.":[114]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
