Author:
Khalid Ayesha,Paul Goutam,Chattopadhyay Anupam
Reference22 articles.
1. Guneysu T, Kasper T, Novotny M, Paar C, Rupp A (2008) Cryptanalysis with COPACOBANA. IEEE Trans Comput 57(11):1498–1513
2. Amazon, Microsoft recommends against usage of SHA-1.
www.zdnet.com/article/microsoft-recommends-against-usage-of-sha-1
3. Rijmen V, Oswald E (2005) Update on SHA-1. In: Topics in cryptology–CT-RSA. Springer, Berlin, pp 58–71
4. Chabaud F, Joux A (1998) Differential collisions in SHA-0. In: Advances in cryptology–CRYPTO. Springer, Berlin, pp 56–71
5. Wang X, Yin YL, Yu H (2005) Finding collisions in the full SHA-1. In: Advances in cryptology-CRYPTO. Springer, Berlin, pp 17–36