1 |
D.H. Chang, S.H. Hong, C.H. Kang, J.K. Kang, J.S. Kim, C.H. Lee, J.S. Lee, J.T. Lee, S.J, Lee, YS. Lee, J.I. Lim, and J.C. Sung, 'ARIRANG: SHA-3 Proposal,' available at http://csrc.nist.gov I groupsIST/hash/sha-3/Ro undll
|
2 |
Y. Sasaki and K. Aoki, 'Preimage Attacks on Step-Reduced MD5,' ACISP 2008, LNCS 5107, pp. 282-296, 2008
|
3 |
Y. Sasaki and K. Aoki, 'Preimage Attacks on 3, 4. and 5-Pass HAVAL,' ASIACRYPT 2008, LNCS 5350. pp. 253-271. 2008
|
4 |
Y. Sasaki and K. Aoki, 'A Preimage Attack for 52-Step HAS-160,' ICISC 2008, LNCS 5461. pp. 302-317, 2008
|