Skip to content

Commit ea6daac

Browse files
committed
chapter 2: add new reference
1 parent 27a9884 commit ea6daac

File tree

2 files changed

+15
-3
lines changed

2 files changed

+15
-3
lines changed

src/thesis/2-reproducibility.typ

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1035,9 +1035,9 @@ of different inputs.
10351035

10361036
#info-box(kind: "info")[
10371037
Choosing an appropriate checksum algorithm is paramount due to the rapid
1038-
evolution of computational power as described by Moore's Law, which leads to
1039-
previously secure algorithms becoming vulnerable as computing capabilities
1040-
expand.
1038+
evolution of computational power as described by Moore's Law
1039+
#cite(<4785860>,form:"normal"), which leads to previously secure algorithms
1040+
becoming vulnerable as computing capabilities expand.
10411041

10421042
For instance, #gls("MD5") checksums, once deemed secure for storing passwords,
10431043
are now easily compromised through brute force attacks. This underlines the

src/thesis/literature.bib

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1048,3 +1048,15 @@ @article{8509170
10481048
keywords = {Microsoft Windows;History;Software development;Software maintenance;Software engineering},
10491049
doi = {10.1109/MAHC.2018.2877913}
10501050
}
1051+
1052+
@article{4785860,
1053+
author = {Moore, Gordon E.},
1054+
journal = {IEEE Solid-State Circuits Society Newsletter},
1055+
title = {Cramming more components onto integrated circuits, Reprinted from Electronics, volume 38, number 8, April 19, 1965, pp.114 ff.},
1056+
year = {2006},
1057+
volume = {11},
1058+
number = {3},
1059+
pages = {33-35},
1060+
keywords = {Integrated circuits;Computers;Silicon;Films;Heating;Microwave amplifiers;Data mining},
1061+
doi = {10.1109/N-SSC.2006.4785860}
1062+
}

0 commit comments

Comments
 (0)