[1] |
AOKI K , SASAKI Y . Preimage attacks on one-block MD4,63-step MD5 and more[A]. Workshop Records of SAC 2008[C]. Sackville,Canada, 2008. 82-98.
|
[2] |
GUO J , LING S , RRCHBERGER C . Advanced meet-in-the-middle preimage attacks: first results on full tiger,and improved results on MD4 and SHA-2[A]. ASIACRYPT 2010 LNCS[C]. Singapore, 2010. 56-75.
|
[3] |
AOKI K , SASAKI Y . Preimage attacks on 3,4,and 5-Pass HAVAL[A]. ASIACRYPT 2008 LNCS[C]. Melbourne,Australia, 2008. 253-271.
|
[4] |
ISOBE T , SHIBUTANI K . Preimage attacks on reduced tiger and SHA-2[A]. FSE 2009 LNCS[C]. Leuven,Belgium, 2009. 139-155.
|
[5] |
SASAKI Y , AOKI K . Preimage attacks on step-reduced MD5[A]. ACISP 2008 LNCS[C]. Wollongong,Australia, 2008. 282-296.
|
[6] |
SASAKI Y , AOKI K . Preimage attacks on step-reduced MD5[A]. ACISP 2008 LNCS[C]. Wollongong,Australia, 2008. 282-296.
|
[7] |
LI J , ISOBE T , SHIBUTANI K . Converting meet-in-the-middle preimage attack into pseudo collision attack: application to SHA-2[A]. ACISP 2008 LNCS[C]. Washington DC,USA, 2012. 264-286.
|
[8] |
KHOVRATOVICH D , RECHBERGER C , SAVELIEVA A . Bicliques for preimages: attacks on skein-512 and the SHA-2 family[A]. FSE 2012 LNCS[C]. Washington DC,USA, 2012. 244-263.
|
[9] |
LEE J , CHANG D , KIM H . A new 256-bit hash function DHA-256 enhancing the security of SHA-256[EB/OL].
|
[10] |
IAIK krypto group: preliminary analysis of DHA-256[EB/OL].
|
[11] |
ZHONG J M , LAI X J . Preimage attack on reduced DHA-256[J]. J Inf Sci Eng, 2011,27(4): 1315-1327.
|
[12] |
ALFRED J , MENEZES P C V O , VANSTONE S A . Handbook of Applied Cryptography[M]. CRC Press, 2011.
|
[13] |
DELESCAILLE J P , QUISQUATER J J . How easy is collision search?application to DES[A]. EUROCRYPT 1989 LNCS[C]. Houthalen,Belgium, 1990. 429-434.
|
[14] |
SEDGEWICK R , SZYMANSKI T G , YAO A C . The complexity of finding cycles in periodic functions[J]. SIAM J Comput, 1982,11(2): 376-390.
|