Herding, Second Preimage and Trojan Message Attacks beyond Merkle-Damg??rd, Lecture Notes in Computer Science, vol.5867, pp.393-414, 2009. ,
DOI : 10.1007/978-3-642-05445-7_25
A Framework for Iterative Hash Functions -HAIFA. IACR Cryptology ePrint Archive, Report, p.278, 2007. ,
On the Impossibility of Efficiently Combining Collision Resistant Hash Functions, Lecture Notes in Computer Science, vol.4117, pp.570-583, 2006. ,
DOI : 10.1007/11818175_34
A Design Principle for Hash Functions, Lecture Notes in Computer Science, vol.435, pp.416-427, 1989. ,
DOI : 10.1007/0-387-34805-0_39
The TLS Protocol Version 1.0. RFC 2246 (Proposed Standard), p.6176, 1999. ,
The Transport Layer Security (TLS) Protocol Version 1.2. RFC 5246 (Proposed Standard), p.6176, 2008. ,
RIPEMD-160: A strengthened version of RIPEMD, Lecture Notes in Computer Science, vol.1039, pp.71-82, 1996. ,
DOI : 10.1007/3-540-60865-6_44
Multi-property Preserving Combiners for Hash Functions, Lecture Notes in Computer Science, vol.4948, pp.375-392, 2008. ,
DOI : 10.1007/978-3-540-78524-8_21
Robust Multi-property Combiners for Hash Functions Revisited, Lecture Notes in Computer Science, vol.5126, issue.2, pp.655-666, 2008. ,
DOI : 10.1007/978-3-540-70583-3_53
Robust Multi-Property Combiners for Hash Functions, Journal of Cryptology, vol.12, issue.1, pp.397-428, 2014. ,
DOI : 10.1007/s00145-013-9148-7
The Secure Sockets Layer (SSL) Protocol Version 3.0. RFC 6101 (Historic) A Design of Cryptographic Hash Function Group with Variable Output-Length Based on SHA-1, ISEC, vol.102, issue.212, pp.69-76, 2002. ,
Breaking the ICE ??? Finding Multicollisions in Iterated Concatenated and Expanded (ICE) Hash Functions, Lecture Notes in Computer Science, vol.4047, pp.179-194, 2006. ,
DOI : 10.1007/11799313_12
On the Strength of the Concatenated Hash Combiner When All the Hash Functions Are Weak, Lecture Notes in Computer Science, vol.5126, issue.2, pp.616-630, 2008. ,
DOI : 10.1007/978-3-540-70583-3_50
A New Dedicated 256-Bit Hash Function: FORK-256, Lecture Notes in Computer Science, vol.4047, pp.195-209, 2006. ,
DOI : 10.1007/11799313_13
The lane hash function. Submission to NIST, 2008. ,
Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions, Lecture Notes in Computer Science, vol.3152, pp.306-316, 2004. ,
DOI : 10.1007/978-3-540-28628-8_19
Herding Hash Functions and the Nostradamus Attack, Lecture Notes in Computer Science, vol.4004, pp.183-200, 2006. ,
DOI : 10.1007/11761679_12
Second Preimages on n-Bit Hash Functions for Much Less than 2 n Work, Lecture Notes in Computer Science, vol.3494, pp.474-490, 2005. ,
DOI : 10.1007/11426639_28
On the Security of Hash Function Combiners, 2010. ,
Constructing an Ideal Hash Function from Weak Ideal Compression Functions, Lecture Notes in Computer Science, vol.4356, pp.358-375, 2006. ,
DOI : 10.1007/978-3-540-74462-7_25
Differential Attacks on Reduced RIPEMD-160, Lecture Notes in Computer Science, vol.7483, pp.23-38, 2012. ,
DOI : 10.1007/978-3-642-33383-5_2
Improved Cryptanalysis of Reduced RIPEMD-160, Lecture Notes in Computer Science, vol.8270, issue.2, pp.484-503, 2013. ,
DOI : 10.1007/978-3-642-42045-0_25
On the Collision Resistance of RIPEMD-160, Lecture Notes in Computer Science, vol.4176, pp.101-116, 2006. ,
DOI : 10.1007/11836810_8
MD5 Is Weaker Than Weak: Attacks on Concatenated Combiners, Lecture Notes in Computer Science, vol.5912, pp.144-161, 2009. ,
DOI : 10.1007/978-3-642-10366-7_9
Breaking and Fixing Cryptophia???s Short Combiner, CANS. Lecture Notes in Computer Science, 2014. ,
DOI : 10.1007/978-3-319-12280-9_4
One Way Hash Functions and DES, Lecture Notes in Computer Science, vol.435, pp.428-446, 1989. ,
DOI : 10.1007/0-387-34805-0_40
Hash Combiners for Second Pre-image Resistance, Target Collision Resistance and Pre-image Resistance Have Long Output, Lecture Notes in Computer Science, vol.7485, pp.522-539, 2012. ,
DOI : 10.1007/978-3-642-32928-9_29
Cryptophia???s Short Combiner for Collision-Resistant Hash Functions, ACNS. Lecture Notes in Computer Science, vol.7954, pp.136-153, 2013. ,
DOI : 10.1007/978-3-642-38980-1_9
Multicollision Attacks on Some Generalized Sequential Hash Functions, IEEE Transactions on Information Theory, vol.53, issue.2, pp.759-767, 2007. ,
DOI : 10.1109/TIT.2006.889721
HAS-V: A New Hash Function with Variable Output Length, Lecture Notes in Computer Science, vol.2012, pp.202-216, 2000. ,
DOI : 10.1007/3-540-44983-3_15
Non-trivial Black-Box Combiners for Collision-Resistant Hash-Functions Don???t Exist, Lecture Notes in Computer Science, vol.4515, pp.23-33, 2007. ,
DOI : 10.1007/978-3-540-72540-4_2
On Existence of Robust Combiners for Cryptographic Hash Functions, ITAT. CEUR Workshop Proceedings, pp.71-76, 2009. ,
Distinguishers beyond Three Rounds of the RIPEMD-128/-160 Compression Functions, ACNS. Lecture Notes in Computer Science, vol.7341, pp.275-292, 2012. ,
DOI : 10.1007/978-3-642-31284-7_17
A Generalized Birthday Problem, Lecture Notes in Computer Science, vol.2442, pp.288-303, 2002. ,
DOI : 10.1007/3-540-45708-9_19
Finding Collisions in the Full SHA-1, Lecture Notes in Computer Science, vol.3621, pp.17-36, 2005. ,
DOI : 10.1007/11535218_2
How to Break MD5 and Other Hash Functions, Lecture Notes in Computer Science, vol.3494, pp.19-35, 2005. ,
DOI : 10.1007/11426639_2