The Second-Preimage Attack on MD4
暂无分享,去创建一个
[1] Xiaoyun Wang,et al. How to Break MD5 and Other Hash Functions , 2005, EUROCRYPT.
[2] Gerhard Goos,et al. Fast Software Encryption , 2001, Lecture Notes in Computer Science.
[3] Bart Preneel,et al. Integrity Primitives for Secure Information Systems , 2005, Lecture Notes in Computer Science.
[4] Bart Preneel,et al. Integrity Primitives for Secure Information Systems: Final RIPE Report of RACE Integrity Primitives Evaluation , 1995 .
[5] Ronald Cramer,et al. Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings , 2005, EUROCRYPT.
[6] Hans Dobbertin. Cryptanalysis of MD4 , 1996, FSE.
[7] Victor Shoup. Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings , 2005, CRYPTO.
[8] Feng Dengguo,et al. An attack on hash function HAVAL-128 , 2005 .
[9] Hans Dobbertin,et al. The First Two Rounds of MD4 are Not One-Way , 1998, FSE.
[10] Joos Vandewalle,et al. Integrity primitives for secure information systems : final report of RACE Integrity Primitives Evaluation RIPE-RACE 1040 , 1995 .
[11] Hui Chen,et al. Cryptanalysis of the Hash Functions MD4 and RIPEMD , 2005, EUROCRYPT.
[12] Michael Wiener,et al. Advances in Cryptology — CRYPTO’ 99 , 1999 .
[13] Dengguo Feng,et al. An attack on hash function HAVAL-128 , 2007, Science in China Series F: Information Sciences.
[14] Jennifer Seberry,et al. HAVAL - A One-Way Hashing Algorithm with Variable Length of Output , 1992, AUSCRYPT.
[15] Xiaoyun Wang,et al. Efficient Collision Search Attacks on SHA-0 , 2005, CRYPTO.
[16] Ronald L. Rivest,et al. The MD4 Message-Digest Algorithm , 1990, RFC.
[17] Xiaoyun Wang,et al. Finding Collisions in the Full SHA-1 , 2005, CRYPTO.