1 |
Berson, Thomas A.. "Differential Cryptanalysis Mod 232 with Applications to MD5". EUROCRYPT. pp. 71-80, Nov 1992.
|
2 |
Bert den Boer, and Antoon Bosselaers, "Collisions for the Compression Function of MD5", Berlin London, Springer, pp. 293-304, 1993.
|
3 |
Hans Dobbertin, "Cryptanalysis of MD5 compress.", Announcement on Internet, "http://Citeseer.ist.psu.edu", May 1996.
|
4 |
Dobbertin, Hans, "The Status of MD5 After a Recent Attack", CryptoBytes, Vol.3, No.2, pp. 9-14, 1996.
|
5 |
Xiaoyun Wang, and Hongbo Yu, "How to Break MD5 and Other Hash Functions", Lecture Notes in Computer Science Volume 3494, pp. 19-35, 2005.
|
6 |
Stephane Manuel, "Classification and Generation of Disturbance Vectors for Collision Attacks against SHA-1", Spring Science Business Media, Volume 59, Issue 1-3, pp. 247-263, April 2011.
|
7 |
SHA-1 wikipedia "http://www.saylor.org/site/wp-content/uploads/2012/07/SHA-1-1.pdf"
|
8 |
Ho-Min, Jeong, "Design of Deduplication Supported Clustering Backup System using File Finger Printing", Korea Information Processing Society, Vol 14 No 2, pp. 0737-0740, Nov 2007.
|
9 |
Jung Hoon Kim, Byoung Hong Lim, Young Ik Eom, "Eliminating Redundant Data for Storage Efficiency on Distributed File Systems", Korea Information Processing Society, Vol 16 No 2, pp. 0111-0112, Nov 2009.
|