Second Preimage Attacks on Dithered Hash Functions, Lecture Notes in Computer Science, vol.4965, pp.270-288, 2008. ,
DOI : 10.1007/978-3-540-78967-3_16
URL : https://hal.archives-ouvertes.fr/inria-00417796
Collision-Resistant hashing: Towards making UOWHFs practical, Lecture Notes in Computer Science, vol.1294, pp.470-484, 1997. ,
DOI : 10.1007/BFb0052256
Improved Time-Memory Trade-Offs with Multiple Data, Selected Areas in Cryptography, pp.110-127, 2005. ,
DOI : 10.1007/11693383_8
Cryptanalytic Time/Memory/Data Tradeoffs for Stream Ciphers, Lecture Notes in Computer Science, pp.1-13, 1976. ,
DOI : 10.1007/3-540-44448-3_1
Another Birthday Attack, Lecture Notes in Computer Science, vol.218, pp.14-17, 1985. ,
DOI : 10.1007/3-540-39799-X_2
A Design Principle for Hash Functions, pp.416-427 ,
DOI : 10.1007/0-387-34805-0_39
Formal Aspects of Mobile Code Security, 1999. ,
Breaking the ICE ??? Finding Multicollisions in Iterated Concatenated and Expanded (ICE) Hash Functions, Lecture Notes in Computer Science, vol.4047, pp.179-194, 2006. ,
DOI : 10.1007/11799313_12
Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions, Lecture Notes in Computer Science, vol.3152, pp.306-316, 2004. ,
DOI : 10.1007/978-3-540-28628-8_19
Herding Hash Functions and the Nostradamus Attack, Lecture Notes in Computer Science, vol.4004, pp.183-200, 2006. ,
DOI : 10.1007/11761679_12
Second Preimages on n-Bit Hash Functions for Much Less than 2 n Work, EUROCRYPT'05, pp.474-490, 2005. ,
DOI : 10.1007/11426639_28
Constructing an Ideal Hash Function from Weak Ideal Compression Functions, Lecture Notes in Computer Science, vol.4356, pp.358-375, 2006. ,
DOI : 10.1007/978-3-540-74462-7_25
One Way Hash Functions and DES, pp.428-446 ,
DOI : 10.1007/0-387-34805-0_40
Multicollision Attacks on Some Generalized Sequential Hash Functions, IEEE Transactions on Information Theory, vol.53, issue.2, pp.759-767, 2007. ,
DOI : 10.1109/TIT.2006.889721
The MD5 message-digest algorithm, p.1321, 1992. ,
DOI : 10.17487/rfc1321
The md6 hash function, p.3, 2008. ,
Construction of universal one-way hash functions: Tree hashing revisited, Discrete Applied Mathematics, vol.155, issue.16, pp.2174-2180, 2007. ,
DOI : 10.1016/j.dam.2007.05.005
Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate, Cryptology ePrint Archive Report, vol.111, 2009. ,
DOI : 10.1007/978-3-642-03356-8_4