Time-memory-processor trade-offs, IEEE Transactions on Information Theory, vol.34, issue.3, pp.505-512, 1988. ,
DOI : 10.1109/18.6030
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.118.9205
New Proofs for NMAC and HMAC: Security Without Collision-Resistance, Lecture Notes in Computer Science, vol.4117, pp.602-619, 2006. ,
DOI : 10.1007/11818175_36
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.116.59
Keying Hash Functions for Message Authentication, Lecture Notes in Computer Science, vol.1109, pp.1-15, 1996. ,
DOI : 10.1007/3-540-68697-5_1
Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions, Lecture Notes in Computer Science, vol.4284, 2006. ,
DOI : 10.1007/11935230_3
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.77.8359
Advances in Cryptology -EUROCRYPT, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques Proceedings, 2005. ,
Cryptanalysis of Hash Functions of the MD4-Family, 2005. ,
Collisions for the compression function of MD5, Proc. EUROCRYPT '93, pp.293-304, 1993. ,
DOI : 10.1007/3-540-48285-7_26
Automatic Search of Differential Path, MD4. ECRYPT Hash Worshop ? Cryptology ePrint Archive, 2007. ,
On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract), Lecture Notes in Computer Science, vol.4116, pp.242-256, 2006. ,
DOI : 10.1007/11832072_17
Message Freedom in MD4 and MD5: Application to APOP Security, 2007. ,
MDx-MAC and Building Fast MACs from Hash Functions, Lecture Notes in Computer Science, vol.963, pp.1-14, 1995. ,
DOI : 10.1007/3-540-44750-4_1
On the Security of Two MAC Algorithms, In: EUROCRYPT, pp.19-32, 1996. ,
DOI : 10.1007/3-540-68339-9_3
On the security of iterated message authentication codes, IEEE Transactions on Information Theory, vol.45, issue.1, pp.188-199, 1999. ,
DOI : 10.1109/18.746787
Note on Distinguishing, Forgery, and Second Preimage Attacks on HMAC-SHA-1 and a Method to Reduce the Key Entropy of NMAC. Cryptology ePrint Archive, Report, vol.290, 2006. ,
On Authentication with HMAC and Non-random Properties, 2007. ,
DOI : 10.1007/978-3-540-77366-5_13
URL : https://www.cosic.esat.kuleuven.be/publications/article-1059.pdf
Advances in Cryptology, CRYPTO 2005: 25th Annual International Cryptology Conference Proceedings, 2005. ,
Cryptanalysis of the Hash Functions MD4 and RIPEMD, pp.1-18 ,
DOI : 10.1007/11426639_1
Finding Collisions in the Full SHA-1, pp.17-36 ,
DOI : 10.1007/11535218_2
How to Break MD5 and Other Hash Functions, pp.19-35 ,
DOI : 10.1007/11426639_2
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.102.6718
Efficient Collision Search Attacks on SHA-0, pp.1-16 ,
DOI : 10.1007/11535218_1
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.86.9654
The Second-Preimage Attack on MD4, Lecture Notes in Computer Science, vol.381013, pp.1-12, 2005. ,
DOI : 10.1007/11599371_1