Preimage Attacks on Reduced Tiger and SHA-2
暂无分享,去创建一个
[1] Ronald Cramer,et al. Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings , 2005, EUROCRYPT.
[2] Hans Dobbertin. Cryptanalysis of MD4 , 1996, FSE.
[3] Victor Shoup. Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings , 2005, CRYPTO.
[4] Gerhard Goos,et al. Fast Software Encryption , 2001, Lecture Notes in Computer Science.
[5] Eli Biham,et al. TIGER: A Fast New Hash Function , 1996, FSE.
[6] Yu Sasaki,et al. Preimage Attacks on One-Block MD4, 63-Step MD5 and More , 2009, Selected Areas in Cryptography.
[7] Vincent Rijmen,et al. Cryptanalysis of the Tiger Hash Function , 2007, ASIACRYPT.
[8] Gaëtan Leurent,et al. MD4 is Not One-Way , 2008, FSE.
[9] Vincent Rijmen,et al. Update on Tiger , 2006, INDOCRYPT.
[10] Kaoru Kurosawa,et al. Advances in Cryptology - ASIACRYPT 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings , 2007, International Conference on the Theory and Application of Cryptology and Information Security.
[11] Xiaoyun Wang,et al. Finding Collisions in the Full SHA-1 , 2005, CRYPTO.
[12] Bart Preneel,et al. Preimages for Reduced-Round Tiger , 2007, WEWoRC.
[13] John Kelsey,et al. Collisions and Near-Collisions for Reduced-Round Tiger , 2006, FSE.
[14] Tanja Lange,et al. Progress in Cryptology - INDOCRYPT 2006, 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings , 2006, INDOCRYPT.
[15] Ahmad-Reza Sadeghi,et al. Research in Cryptology, Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, Revised Selected Papers , 2008, WEWoRC.
[16] Florian Mendel,et al. A (Second) Preimage Attack on the GOST Hash Function , 2008, FSE.
[17] Xiaoyun Wang,et al. How to Break MD5 and Other Hash Functions , 2005, EUROCRYPT.