E. Andreeva, C. Bouillaguet, P. A. Fouque, J. J. Hoch, J. Kelsey et al., Second Preimage Attacks on Dithered Hash Functions, Lecture Notes in Computer Science, vol.4965, pp.270-288, 2008.
DOI : 10.1007/978-3-540-78967-3_16

URL : https://hal.archives-ouvertes.fr/inria-00417796

M. Bellare and P. Rogaway, Collision-Resistant hashing: Towards making UOWHFs practical, Lecture Notes in Computer Science, vol.1294, pp.470-484, 1997.
DOI : 10.1007/BFb0052256

A. Biryukov, S. Mukhopadhyay, and P. Sarkar, Improved Time-Memory Trade-Offs with Multiple Data, Selected Areas in Cryptography, pp.110-127, 2005.
DOI : 10.1007/11693383_8

A. Biryukov and A. Shamir, Cryptanalytic Time/Memory/Data Tradeoffs for Stream Ciphers, Lecture Notes in Computer Science, pp.1-13, 1976.
DOI : 10.1007/3-540-44448-3_1

D. Coppersmith, Another Birthday Attack, Lecture Notes in Computer Science, vol.218, pp.14-17, 1985.
DOI : 10.1007/3-540-39799-X_2

I. Damgård, A Design Principle for Hash Functions, pp.416-427
DOI : 10.1007/0-387-34805-0_39

R. D. Dean, Formal Aspects of Mobile Code Security, 1999.

J. J. Hoch and A. Shamir, Breaking the ICE ??? Finding Multicollisions in Iterated Concatenated and Expanded (ICE) Hash Functions, Lecture Notes in Computer Science, vol.4047, pp.179-194, 2006.
DOI : 10.1007/11799313_12

A. Joux, Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions, Lecture Notes in Computer Science, vol.3152, pp.306-316, 2004.
DOI : 10.1007/978-3-540-28628-8_19

J. Kelsey and T. Kohno, Herding Hash Functions and the Nostradamus Attack, Lecture Notes in Computer Science, vol.4004, pp.183-200, 2006.
DOI : 10.1007/11761679_12

J. Kelsey and B. Schneier, Second Preimages on n-Bit Hash Functions for Much Less than 2 n Work, EUROCRYPT'05, pp.474-490, 2005.
DOI : 10.1007/11426639_28

M. Liskov, Constructing an Ideal Hash Function from Weak Ideal Compression Functions, Lecture Notes in Computer Science, vol.4356, pp.358-375, 2006.
DOI : 10.1007/978-3-540-74462-7_25

R. C. Merkle, One Way Hash Functions and DES, pp.428-446
DOI : 10.1007/0-387-34805-0_40

M. Nandi and D. R. Stinson, Multicollision Attacks on Some Generalized Sequential Hash Functions, IEEE Transactions on Information Theory, vol.53, issue.2, pp.759-767, 2007.
DOI : 10.1109/TIT.2006.889721

R. L. Rivest, The MD5 message-digest algorithm, p.1321, 1992.
DOI : 10.17487/rfc1321

R. L. Rivest, B. Agre, D. V. Bailey, C. Crutchfield, Y. Dodis et al., The md6 hash function, p.3, 2008.

P. Sarkar, Construction of universal one-way hash functions: Tree hashing revisited, Discrete Applied Mathematics, vol.155, issue.16, pp.2174-2180, 2007.
DOI : 10.1016/j.dam.2007.05.005

M. Stevens, A. Sotirov, J. Appelbaum, A. Lenstra, D. Molnar et al., Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate, Cryptology ePrint Archive Report, vol.111, 2009.
DOI : 10.1007/978-3-642-03356-8_4