References
- Advances in Cryptology-Crypto'96, Lecture Notes in Computer Science v.1109 Keying Hash Functions for Message Authentication M.Bellare;R.Canetti;H.Krawczyk
- Advances in Cryptology-Crypto'94, Lecture Notes in Computer Science v.839 The security of cipher block chaining M.Bellare;J.Kilian;P.Rogaway
- Advances in Cryptology-Crypto'90, Lecture Notes in Computer Science v.537 Differential cryptanalysis of DES-like crytoysystems E.Biham;A.Shamir
- Advances in Cryptology-Crypto'91, Lecture Notes in Computer Science v.576 An attack on the last two rounds of MD4 B.den Boer;A.Bosselaers
- ETRI J. v.19 no.4 Corrlation Immune Functions with Controllable Nonlinearity Chee,S.Lee;K.Kim;D.Kim
- Advances in Cryptology-Crypto'89, Lecture Notes in Computer Science v.435 A design principle for hash functions I.B.Damgard
- Journal of Cryptology v.10 no.1 RIPEMD with two-round compress function is not collision-free H.Dobbertin
- Fast Software Encryption-Cambridge Workshop, Lecture Notes in Computer Science v.1039 Crytanalysis of MD4 H.Dobbertin
- Fast Software Encryption-Cambridge Workshop, Lecture Notes in Computer Science v.1039 A strengthened version of RIPEMD H.Dobbertin;A.Bosselaers;B.Preneel
- RSA LAB's CryptoBytes v.2 no.2 The status of MD5 after recent attack H.Dobbertin
- RSA LAB's CryptoBytes v.1 no.1 Message Authentication with MD5 B.Kaliski;M.Robshaw
- Advances in Cryptology Crypto'94, Lecture Notes in Computer Science v.839 The first experimental cryptanalysis of the Data Encryption Standard M.Matsui
- Advances in Cryptology Crypto'89, Lecture Notes in Computer Science v.435 One way hash functions and DES R.Merkle
- FIPS 180, US Department of Commerce Secure hash standard NIST
- FIPS 180-1, US Department of Commerce Secure hash standard NIST
- Proc. of the 2nd ACM Conference on Computer and Communications Security Parallel collision search with applications to hash functions and discrete logarithms P.C.van Oorshot;M.J.Wiener
- Analysis and design of crytographic hash functions B.Prenceel
- Advances in Cryptology-Crypto'95, Lecture Notes in Computer Science v.963 MDx-Mac and Building Fast MACs from Hash Functions B.Preneel,P.van Oorschot
- Advances in Cryptology-Crypto'96, Lecture Notes in Computer Science v.963 On the security of two MAC algorithms PO2B.Preneel;P.van Oorschot
- Lecture Notes in Computer Science v.1007 RIPE Consortium : RIPE Integrity Primitives-Final report of Race Integrity Primitives Evaluation (R1040)
- Request For Comments(RFC) 1320 The MD4 message-digest algorithm R.Rivest
- Request For Comments(RFC) 1320 The MD5 message-digest algorithm R.Rivest
- RSA LAB's CryBytes v.1 no.1 The RC5 Encryption Algorithm R.Rivest
- Advances in Cryptology-Auscrypt'92, Lecture Notes in Computer Science v.718 Highly nonlinear 0-1 balanced functions satisfying strict avalanche criterion J.Seberry;X.M.Zhang
- Proceedings of Infocom'92 Message authentication with one-way hash functions G.Tsudik
- Advances in Cryptology-Auscrypt'92, Lecture Notes in Computer Science v.718 HAVAL- a one-way hashing algorithm with variable length and output Y.Zheng;J.Pieprzyk;J.Seberry
- Proceedings of the 1-st workshop in Applied Mathematics Fast generator of random permutation Seung Chul Ko;Kyung Hyune Rhee
- PKD'98(International Workshop on Practice and Theory in Public Key Cryptograpy), Lecture Notes on Computer Science v.1431 A new hash function based on MDx-family and its application to MAC Sang Uk Shin;Kyung Hyune Rhee;Dae Hyun Ryu;Sang Jin Lee
- The proposal of the new hash function possible to select the output length Chae Hoon Lim;Nan Kyung Park;Eun Jeong Lee;Pil Joong Lee