References
- Advances in Cryptology-Crypto'90, Lecture Notes in Computer Science v.537 Differential cryptanalysis of DES-like cryptosystems E. Biham;A. Shamir
- Advances in Cryptology-Crypto'91, Lecture Notes in Computer Science v.576 An attack on the last two rounds of MD4 B. den Boer;A. Bosselaers
- Advances in Cryptology-Crypto'89, Lecture Notes in Computer Science v.435 A design principle for hash functions I.B. Damg rd
- Journal of Cryptology v.10 no.1 RIPEMD with two-round compress function is not collision-free H. Dobbertin
- Fast Software Encryption-Cambridge Workshop, Lecture Notes in Computer Science v.1039 Cryptanalysis of MD4 H. Dobbertin
- Fast Software Encryption-Cambridge Workshop, Lecture Notes in Computer Science v.1039 RIPEMD-160: A strengthened version of RIPEMD H. Dobbertin;A. Bosselaers;B. Preneel
- CryptoBytes v.2 no.2 The status of MD5 after recent attack H.Dobbertin
- Advances in Cryptology-Crypto'94, Lecture Notes in Computer Science v.839 The first experimental cryptanalysis of the Data Encryption Standard M. Matsui
- Advances in Cryptology-Crypto'89, Lecture Notes in Computer Science v.435 One way hash functions and DES R. Merkle
- Secure hash standard, FIPS 180, NIST
- Secure hash standard, FIPS 180, NIST
- Proc. of the 2nd ACM Conference on Computer and Communications Security Parallel collision search with applications to hash functions and discrete logarithms P.C. van Oorshot;M.J. Wiener
- Doctoral Dissertation Analysis and design of cryptographic hash functions B. Preneel
- Lecture Notes in Computer Science v.1007 RIPE Integrity Primitives - Final report of RACE Integrity Primitives Evaluation(R1040) RIPE Consortium
- Advances in Cryptology-Crypto'90, Lecture Notes in Computer Science v.537 The MD4 message-digest algorithm R. Rivest
- Request For Comments(RFC) 1320, Internet Activities Borard, Internet Privacy Task Force The MD4 message-digest algorithm R. Rivest
- Request For Comments(RFC) 1320, Internet Activites Board, Internet Privacy Task Force The MD5 message-digest algorithm R. Rivest
- Crytobytes v.1 no.1 The RC5 Encryption Algorithm R. Rivest
- Advances in Cryptology-Auscrypt'92, Lecture Notes in Computer Science v.718 Highly nonlinear 0-1 balanced boolean function satisfying strict avalanche criterion J. Seberry;X. M. Zhang
- Advances in Cryptology-Auscrypt'92, Lecture Notes in Computer Science v.718 HAVAL-a one-way hashing algorithm with variable length and output Y. Zheng;J. Pieprzyk;J. Seberry
- 출력길이 선택이 가능한 새로운 해쉬 함수의 제안 임채훈;박난정;이은정;이필중