1 Wang X Y, Lai X J, Feng D G, et al. Cryptanalysis of the hashfunctions MD4 and RIPEMD [C]// Advances in Cryptology,EUROCRYPT 2005, LNCS 3494. Berlin: Springer-Verlag, 2005: 1-18. 2 Wang X Y, Yu H B. How to break MD5 and other hash functions[C]// Advances in Cryptology, EUROCRYPT 2005, LNCS3494. Berlin: Springer-Verlag, 2005: 19-35. 3 Wang X Y, Yu H B, Yin Y Q L. Efficient collision searchattacks on SHA-0 [C]// Advances in Cryptology, CRYPTO 2005,LNCS 3621. Berlin: Springer-Verlag, 2005: 1-16. 4 Wang X Y, Yin Y Q, Yu H B. Finding collisions in the fullSHA-1 [C]// Advances in Cryptology, CRYPTO 2005, LNCS 3621.Berlin: Springer-Verlag, 2005: 17-36. 5 Zheng Y L, Pieprzyk J, Seberry J. HAVAL---A one-way hashingalgorithm with variable length of output [C]// Advances inCryptology, ASIACRYPT 1992, LNCS 718. Berlin: Springer-Verlag,1993: 83-104. 6 Wang X Y, Feng D G, Yu X Y. An attack on hash functionHAVAL-128 [J]. Science in China Series F: InformationSciences, 2005, 48 (5): 545-556. 7 Van ROMPAY B, Biryukov A, Preneel B, et al. Cryptanalysis of3-pass HAVAL [C]// Advances in Cryptology, ASIACRYPT 2003, LNCS2894. Berlin: Springer-Verlag, 2003: 228-245. 8 Yu H B, Wang X Y, Yun A, et al. Cryptanalysis of the fullHAVAL with 4 and 5 passes [C]// Fast Software Encryption 2006,LNCS 4047. Berlin: Springer-Verlag, 2006: 89-110. 9 Suzuki K, Kurosawa K. How to find many collisions of 3-passhaval [C]// Second International Workshop on Security, IWSEC2007, LNCS 4752. Berlin: Springer-Verlag, 2007: 428-443. 10 Yu H B, Wang X Y. Multi-collision attack on the compressionfunctions of MD4 and 3-pass HAVAL [C]// Information Securityand Cryptology, ICISC 2007, LNCS 4817. Berlin: Springer-Verlag,2007: 206-226. 11 Lee E, Chang D, Kim J, et al. Second preimage attack on 3-passHAVAL and partial key-recovery attacks on HMAC/NMAC-3-pass HAVAL[C]// Fast Software Encryption 2008, LNCS 5086. Berlin:Springer-Verlag, 2008: 189-206. 12 Yu H B, Wang G L, Zhang G Y, et al. The second preimage attackon MD4 [C]// Cryptology and Network Security (CANS) 2005, LNCS3810. Berlin: Springer-Verlag, 2005: 1-12. 13 Wang G L, Wang S H. Second preimage attack on 5-pass HAVAL andpartial key-recovery attack on HMAC/NMAC-5-pass HAVAL [C]// Progress in Cryptology, AFRICACRYPT 2009, LNCS 5580. Berlin:Springer-Verlag, 2009: 1-13. 14 Aoki K, Guo J, Matusiewicz K, et al. Preimages forstep-reduced SHA-2 [C]// Advances in Cryptology, ASIACRYPT2009, LNCS 5912. Berlin: Springer-Verlag, 2009: 578-597. 15 Sasaki Y, Aoki K. Finding preimages in full MD5 faster thanexhaustive search [C]// Advances in Cryptology, EUROCRYPT 2009,LNCS 5479. Berlin: Springer-Verlag, 2009: 134-152. 16 Leurent G. MD4 is not one-way [C]// Fast SoftwareEncryption 2008, LNCS 5086. Berlin: Springer-Verlag, 2008: 412-428. 17 Sasaki Y. Meet-in-the-middle attacks using output truncationin 3-pass HAVAL [C]// Information Security (ISC) 2009, LNCS5735. Berlin: Springer-Verlag, 2009: 79-94. 18 Aumasson J P, Meier W, Mendel F. Preimage attacks on 3-passHAVAL and step-reduced MD5 [C]// Selected Areas in Cryptography2008, LNCS 5381. Berlin: Springer-Verlag, 2009: 120-135. 19 Sasaki Y, Aoki K. Preimage attacks on 3, 4, and 5-pass HAVAL[C]// Advances in Cryptology, ASIACRYPT 2008,LNCS 5350. Berlin: Springer-Verlag, 2008: 253-271. 20 Isobe T, Shibutani K. Preimage attacks on reduced tiger andSHA-2 [C]// Fast Software Encryption 2009, LNCS 5665. Berlin:Springer-Verlag, 2009: 139-155. 21 Aoki K, Sasaki Y. Meet-in-the-middle preimage attacks againstreduced SHA-0 and SHA-1 [C]// Advances in Cryptology, CRYPTO2009, LNCS 5677. Berlin: Springer-Verlag, 2009: 70-89. 22 Guo J, Ling S, Rechberger C, et al. Advancedmeet-in-the-middle preimage attacks: First results on full tiger,and improved results on MD4 and SHA-2 [C]// Advances inCryptology, ASIACRYPT 2010, LNCS 6477. Berlin: Springer-Verlag,2010: 56-75. 23 Zhong J M, Lai X J. Improved preimage attack on one-block md4[EB/OL]. (2011-07-01). http://eprint.iacr.org/2010/583.pdf. 24 Aoki K, Sasaki Y. Preimage attacks on one-block MD4, 63-stepMD5 and more [C]// Selected Areas in Cryptography 2008, LNCS5381. Berlin: Springer-Verlag, 2009: 103-119. 25 Lai X J, Massey J L. Hash functions based on block ciphers[C]// Advances in Cryptology, EUROCRYPT 1992, LNCS 658.Berlin: Springer-Verlag, 1993: 55-70. |