Author:
Du Fangwei,Wang Hong,Ma Zhi
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering
Reference10 articles.
1. Whitfield Diffie and Martin E. Hellman. Exhaustive Cryptanalysis of the NBS Data Encryption Standard. Computer, 10(1977)6, 74–84.
2. B. Mihir and T. Kohno. Hash function balance and its impact on birthday attacks. Advances in Cryptology-Eurocrypt 2004, Springer Berlin Heidelberg, 2004, 401–418.
3. X. Wang and H. Yu. How to break MD5 and other hash functions. Advances in Cryptology, EUROCRY-PT 2005, Aarhus, Denmark, 2005, 19–35.
4. Lecture Notes in Computer Science;D Hong,2006
5. M. Krystian, S. Contini, and J. Pieprzyk. Weaknesses of the FORK-256 compression function. IACR Cryptology ePrint Archive 2006(2006), 317.