Author:
Dobbertin Hans,Bosselaers Antoon,Preneel Bart
Publisher
Springer Berlin Heidelberg
Reference19 articles.
1. R. Anderson, “The classification of hash functions,” Proc. of the IMA Conference on Cryptography and Coding, Cirencester, December 1993, Oxford University Press, 1995, pp. 83–95.
2. I.B. Damgård, “A design principle for hash functions,” Advances in Cryptology, Proc. Crypto'89, LNCS 435, G. Brassard, Ed., Springer-Verlag, 1990, pp. 416–427.
3. B. den Boer, A. Bosselaers, “An attack on the last two rounds of MD4,” Advances in Cryptology, Proc. Crypto'91, LNCS 576, J. Feigenbaum, Ed., Springer-Verlag, 1992, pp. 194–203.
4. B. den Boer, A. Bosselaers, “Collisions for the compression function of MD5,” Advances in Cryptology, Proc. Eurocrypt'93, LNCS 765, T. Helleseth, Ed., Springer-Verlag, 1994, pp. 293–304.
5. H. Dobbertin, “RIPEMD with two-round compress function is not collisionfree,” Journal of Cryptology, to appear.
Cited by
173 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Cryptographic Competitions;Journal of Cryptology;2023-12-08
2. Advanced Power Management for Electric Vehicle Charging Station;2023 International Conference on Self Sustainable Artificial Intelligence Systems (ICSSAS);2023-10-18
3. Design and Analysis of Deep Learning based Water Potability Prediction;2023 International Conference on Self Sustainable Artificial Intelligence Systems (ICSSAS);2023-10-18
4. Smart Auto Image Captioning Using LSTM and Densenet Network;2023 6th International Conference on Contemporary Computing and Informatics (IC3I);2023-09-14
5. Designing and validating an MD5 Hash Algorithm using the UVM Verification Framework and Checkers;2023 14th International Conference on Computing Communication and Networking Technologies (ICCCNT);2023-07-06