H. R. Amirazizi and M. E. Hellman, Time-memory-processor trade-offs, IEEE Transactions on Information Theory, vol.34, issue.3, pp.505-512, 1988.
DOI : 10.1109/18.6030

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.118.9205

M. Bellare, New Proofs for NMAC and HMAC: Security Without Collision-Resistance, Lecture Notes in Computer Science, vol.4117, pp.602-619, 2006.
DOI : 10.1007/11818175_36

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.116.59

M. Bellare, R. Canetti, and H. Krawczyk, Keying Hash Functions for Message Authentication, Lecture Notes in Computer Science, vol.1109, pp.1-15, 1996.
DOI : 10.1007/3-540-68697-5_1

S. Contini and Y. L. Yin, Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions, Lecture Notes in Computer Science, vol.4284, 2006.
DOI : 10.1007/11935230_3

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.77.8359

R. Cramer, Advances in Cryptology -EUROCRYPT, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques Proceedings, 2005.

M. Daum, Cryptanalysis of Hash Functions of the MD4-Family, 2005.

B. Den-boer and A. Bosselaers, Collisions for the compression function of MD5, Proc. EUROCRYPT '93, pp.293-304, 1993.
DOI : 10.1007/3-540-48285-7_26

P. A. Fouque, G. Leurent, and P. Nguyen, Automatic Search of Differential Path, MD4. ECRYPT Hash Worshop ? Cryptology ePrint Archive, 2007.

J. Kim, A. Biryukov, B. Preneel, and S. Hong, On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract), Lecture Notes in Computer Science, vol.4116, pp.242-256, 2006.
DOI : 10.1007/11832072_17

G. Leurent, Message Freedom in MD4 and MD5: Application to APOP Security, 2007.

B. Preneel and P. C. Van-oorschot, MDx-MAC and Building Fast MACs from Hash Functions, Lecture Notes in Computer Science, vol.963, pp.1-14, 1995.
DOI : 10.1007/3-540-44750-4_1

B. Preneel and P. C. Van-oorschot, On the Security of Two MAC Algorithms, In: EUROCRYPT, pp.19-32, 1996.
DOI : 10.1007/3-540-68339-9_3

B. Preneel and P. C. Van-oorschot, On the security of iterated message authentication codes, IEEE Transactions on Information Theory, vol.45, issue.1, pp.188-199, 1999.
DOI : 10.1109/18.746787

C. Rechberger and V. Rijmen, Note on Distinguishing, Forgery, and Second Preimage Attacks on HMAC-SHA-1 and a Method to Reduce the Key Entropy of NMAC. Cryptology ePrint Archive, Report, vol.290, 2006.

C. Rechberger and V. Rijmen, On Authentication with HMAC and Non-random Properties, 2007.
DOI : 10.1007/978-3-540-77366-5_13

URL : https://www.cosic.esat.kuleuven.be/publications/article-1059.pdf

V. Shoup, Advances in Cryptology, CRYPTO 2005: 25th Annual International Cryptology Conference Proceedings, 2005.

X. Wang, X. Lai, D. Feng, H. Chen, and X. Yu, Cryptanalysis of the Hash Functions MD4 and RIPEMD, pp.1-18
DOI : 10.1007/11426639_1

X. Wang, Y. L. Yin, and H. Yu, Finding Collisions in the Full SHA-1, pp.17-36
DOI : 10.1007/11535218_2

X. Wang and H. Yu, How to Break MD5 and Other Hash Functions, pp.19-35
DOI : 10.1007/11426639_2

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.102.6718

X. Wang, H. Yu, and Y. L. Yin, Efficient Collision Search Attacks on SHA-0, pp.1-16
DOI : 10.1007/11535218_1

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.86.9654

H. Yu, G. Wang, G. Zhang, and X. Wang, The Second-Preimage Attack on MD4, Lecture Notes in Computer Science, vol.381013, pp.1-12, 2005.
DOI : 10.1007/11599371_1