Near-collisions of SHA-0, LNCS, vol.3152, pp.290-305, 2004. ,
Collisions of SHA-0 and reduced SHA-1 ,
, LNCS, vol.3494, pp.36-57, 2005.
Transcript collision attacks: Breaking authentication in TLS, IKE and SSH, NDSS 2016. The Internet Society, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01244855
, Lecture Notes in Computer Science, vol.435, 1990.
Differential collisions in SHA-0, LNCS, vol.98, pp.56-71, 1998. ,
A Design Principle for Hash Functions, Brassard [Bra90], pp.416-427 ,
A design principle for hash functions, LNCS, vol.89, pp.416-427, 1990. ,
Collisions for the compressin function of MD5, LNCS, vol.765, issue.93, pp.293-304, 1994. ,
Collisions for 70-step SHA-1: On the full cost of collision search ,
, LNCS, vol.4876, pp.56-73, 2007.
Hash functions and the (amplified) boomerang attack, LNCS, vol.4622, pp.244-263, 2007. ,
Tunnels in hash functions: MD5 collisions within a minute, Cryptology ePrint Archive, 2006. ,
Practical free-start collision attacks on 76-step SHA-1, CRYPTO 2015, Part I, vol.9215, pp.623-642, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01183066
Analysis of differential attacks in ARX constructions, LNCS, vol.7658, pp.226-243, 2012. ,
Second preimages for SMASH, LNCS, vol.4377, pp.101-111, 2007. ,
One Way Hash Functions and DES, Brassard [Bra90], pp.428-446 ,
One way hash functions and DES, Heidelberg, vol.89, pp.428-446, 1990. ,
Collision attack on 5 rounds of Grøstl, LNCS, vol.8540, pp.509-521, 2014. ,
, Secure Hash Standard, vol.180, 1993.
, National Institute of Standards and Technology. FIPS 180-1: Secure Hash Standard, 1995.
, National Institute of Standards and Technology. FIPS 180-2: Secure Hash Standard, 2002.
, SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions, FIPS, vol.202, 2015.
Cryptanalysis of Grindahl, Kaoru Kurosawa, vol.4833, pp.551-567, 2007. ,
The MD4 message digest algorithm, CRYPTO'90, vol.537, pp.303-311, 1991. ,
, RFC 1321: The MD5 Message-Digest Algorithm. Internet Activities Board, 1992.
The first collision for full SHA-1, Part I, vol.10401, pp.570-596, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01982005
Freestart collision for full SHA-1, EU-ROCRYPT 2016, Part I, vol.9665, pp.459-483, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01251023
Chosen-prefix collisions for MD5 and colliding X.509 certificates for different identities, LNCS, vol.4515, pp.1-22, 2007. ,
Short chosenprefix collisions for MD5 and the creation of a rogue CA certificate, LNCS, vol.5677, pp.55-69, 2009. ,
Attacks on Hash Functions and Applications, 2012. ,
New collision attacks on SHA-1 based on optimal joint local-collision analysis, Thomas Johansson and Phong Q. Nguyen, editors, EUROCRYPT 2013, vol.7881, pp.245-261, 2013. ,
Parallel collision search with cryptanalytic applications, Journal of Cryptology, vol.12, issue.1, pp.1-18, 1999. ,
, , 2005.
How to break MD5 and other hash functions, LNCS, vol.3494, pp.19-35, 2005. ,
Finding collisions in the full SHA-1, LNCS, vol.3621, pp.17-36, 2005. ,
Efficient collision search attacks on SHA-0, LNCS, vol.3621, pp.1-16, 2005. ,