Affiliation:
1. Department of Computer Science and Technology; Tsinghua Universtiy; Beijing 100084 China
Funder
National Natural Science Foundation of China
Subject
Computer Networks and Communications,Information Systems
Reference26 articles.
1. Wang X Yu H How to break MD5 and other hash functions Advances in Cryptology-EUROCRYPT 2005 Aarhus, Denmark Springer 2005 19 35
2. Wang X Yin YL Yu H Finding collisions in the full SHA-1 Advances in Cryptology-CRYPTO 2005 Santa Barbara, California, USA Springer 2005 17 36
3. Announcing request for candidate algorithm nominations for a new cryptographic hash algorithm (SHA-3) family;Kayser;Federal Register,2007
4. The Keccak reference;Bertoni;Submission to NIST (Round 3),2011
5. US Department of Commerce N Guideline for implementing cryptography in the federal government. NIST SP - 800-21 2nd ed. 1999