1. Preimage attacks on one-block MD4, 63-step MD5 and more;Aoki,2008
2. Collisions of SHA-0 and reduced SHA-1;Biham,2005
3. Exhaustive cryptanalysis of the NBS data encryption standard;Diffie;Computer,1977
4. Advanced meet-in-the-middle preimage attacks: First results on full tiger, and improved results on MD4 and SHA-2;Guo,2005
5. Boomerang and slide-rotational analysis of SM3 hash function;Kircanski,2012