共 8 条
[1]
Menezes A., Van Oorschot P., Vanstone S., Handbook of Applied Cryptography, (1996)
[2]
Knudsen L., Lai X., New attacks on all double block length hash functions of hash rate 1, including the parallel-DM, Lecture Notes in Computer Science, 950, pp. 410-418, (1995)
[3]
Knudsen L., Lai X., Preneel B., Attacks on fast double block length hash functions, Journal of Cryptology, 11, 1, pp. 59-72, (1998)
[4]
Satoh T., Haga M., Kurosawa K., Towards secure and fast hash functions, IEICE Transactions of Fundamentals, 82 A, 1, pp. 55-62, (1999)
[5]
Girault M., Cohen R., Campana M., A generalized birthday attack, Lecture Notes in Computer Science, 330, pp. 129-156, (1988)
[6]
Black J., Rogaway P., Shrimpton T., Black-box analysis of the block-cipherbased hash-function constructions from PGV, Lecture Notes in Computer Science, 2442, pp. 320-335, (2002)
[7]
Merkle R., One way hash functions and des, Lecture Notes in Computer Science, 435, pp. 428-446, (1990)
[8]
Damgard I., A design principle for hash functions, Lecture Notes in Computer Science, 435, pp. 416-427, (1990)