-
1
-
-
0345490612
-
Cryptanalysis of 3-pass HAVAL
-
Asiacrypt 2003
-
B. V. Rompay, A. Biryukov, B. Preneel, and J. Vandewalle. Cryptanalysis of 3-Pass HAVAL, Asiacrypt 2003, LNCS 2894, pp. 228-245, 2003.
-
(2003)
LNCS
, vol.2894
, pp. 228-245
-
-
Rompay, B.V.1
Biryukov, A.2
Preneel, B.3
Vandewalle, J.4
-
2
-
-
23944465520
-
Non-randomness of the pull 4 and 5-pass HAVAL
-
SON 2004
-
H. Yoshida, A. Biryukov, C. D. Canniere, J. Lano, and B. Preneel. Non-randomness of the Pull 4 and 5-Pass HAVAL; SON 2004, LNCS 3352, pp. 324-336, 2005.
-
(2005)
LNCS
, vol.3352
, pp. 324-336
-
-
Yoshida, H.1
Biryukov, A.2
Canniere, C.D.3
Lano, J.4
Preneel, B.5
-
3
-
-
78650922644
-
The MD4 message digest algorithm
-
Crypto'90
-
R. L. Rivest. The MD4 Message Digest Algorithm, Crypto'90, LNCS 537, pp. 303-311, 1991.
-
(1991)
LNCS
, vol.537
, pp. 303-311
-
-
Rivest, R.L.1
-
4
-
-
0003602325
-
The MD5 message-digest algorithm, request for comments
-
Internet Activities Board, Internet Privacy Task Force
-
R. L. Rivest. The MD5 Message-Digest Algorithm, Request for Comments(RFC 1320), Internet Activities Board, Internet Privacy Task Force, 1992.
-
(1992)
RFC
, vol.1320
-
-
Rivest, R.L.1
-
5
-
-
33746362587
-
An attack on hash function HAVAL-128
-
X. Y. Wang, D. Feng, and X. Yu. An attack on Hash Function HAVAL-128. Science in China Ser. F Information Sciences, Vol. 48, No. 5, pp. 545-556, 2005.
-
(2005)
Science in China Ser. F Information Sciences
, vol.48
, Issue.5
, pp. 545-556
-
-
Wang, X.Y.1
Feng, D.2
Yu, X.3
-
6
-
-
24944575304
-
Cryptanalysis for hash functions MD4 and RIPEMD
-
Eurocrypt'05
-
X. Y. Wang, X. J. Lai, D. Feng, H. Chen, and X. Yu. Cryptanalysis for Hash Functions MD4 and RIPEMD, Eurocrypt'05, LNCS 3494, pp. 1-18, 2005.
-
(2005)
LNCS
, vol.3494
, pp. 1-18
-
-
Wang, X.Y.1
Lai, X.J.2
Feng, D.3
Chen, H.4
Yu, X.5
-
7
-
-
24944591357
-
How to break MD5 and other hash functions
-
Eurocrypt'05
-
X. Y. Wang and H. B. Yu. How to Break MD5 and Other Hash Functions, Eurocrypt'05, LNCS 3494, pp. 19-35, 2005.
-
(2005)
LNCS
, vol.3494
, pp. 19-35
-
-
Wang, X.Y.1
Yu, H.B.2
-
8
-
-
33745122987
-
Efficient collision search attacks on SHA-0
-
Crypto'05
-
X. Y. Wang, H. B. Yu, and Y. L. Yin. Efficient Collision Search Attacks on SHA-0, Crypto'05, LNCS 3621, pp. 1-16, 2005.
-
(2005)
LNCS
, vol.3621
, pp. 1-16
-
-
Wang, X.Y.1
Yu, H.B.2
Yin, Y.L.3
-
9
-
-
33745171465
-
Finding collisions on the full SHA-1
-
Crypto '05
-
X. Y. Wang, Y. L. Yin, and H. B. Yu. Finding collisions on the Full SHA-1, Crypto '05, LNCS 3621, pp. 17-36, 2005.
-
(2005)
LNCS
, vol.3621
, pp. 17-36
-
-
Wang, X.Y.1
Yin, Y.L.2
Yu, H.B.3
-
11
-
-
84985796228
-
HAVAL -A one-way hashing algorithm with variable length of output
-
Auscrypt'92
-
Y. Zheng, J. Pieprzyk and J. Seberry. HAVAL -A One-way Hashing Algorithm with Variable Length of Output, Auscrypt'92, LNCS 718, pp. 83-104, 1993.
-
(1993)
LNCS
, vol.718
, pp. 83-104
-
-
Zheng, Y.1
Pieprzyk, J.2
Seberry, J.3
|