[1] |
SASAKI Y , AOKI K . Preimage attacks on step-reduced MD5[C]// The 13th Information Security and Privacy Australasian Conference. 2008: 282-296.
|
[2] |
GUO J , LING S , RRCHBERGER C . Advanced meet-in-the-middle preimage attacks:first results on full Tiger,and improved results on MD4 and SHA-2[C]// The 16th International Conference on the Theory and Application of Cryptology and Information Security. 2010: 56-75.
|
[3] |
CANNIERE D C , RECHBERGER C . Preimages for reduced SHA-0 and SHA-1[C]// The 28th Annual International Cryptology Conference, 2008: 179-202.
|
[4] |
KHOVRATOVICH D , RECHBERGER C , SAVELIEVA A . Bicliques for preimages:attacks on skein-512 and the SHA-2 family[C]// The 19th Fast Software Encryption International Workshop. 2012: 244-263.
|
[5] |
LI J , ISOBE T , SHIBUTANI K . Converting meet-in-the-middle preimage attack into pseudo collision attack:application to SHA-2[C]// The 19th Fast Software Encryption International Workshop. 2012: 264-286.
|
[6] |
KNELLWOLF S , KHOVRATOVICH D . New preimage attacks against reduced SHA-1[C]// The Advances in Cryptology 32nd Annual Cryptology Conference. 2012: 367-383.
|
[7] |
ZOU J , WU W.L , WU S ,et al. Preimage attacks on step-reduced sm3 hash function[C]// The 14th Information Security and Cryptology International Conference. 2011: 375-390.
|
[8] |
WANG G L , SHEN Y . Z:Preimage and pseudo-collision attacks on step-reduced SM3 hash function[J]. Inf Process Lett, 2013,113(8): 301-306.
|
[9] |
MENDEL F , NAD T , SCHLAFER M . Finding collisions for round-reduced SM3[C]// The Cryptographers' Track at the {RSA}Conference 2013. 2013: 174-188.
|
[10] |
AOKI K , SASAKI Y . Preimage attacks on one-block MD4,63-step MD5 and more[S]// Workshop Records of SAC 2008. 2008: 82-98.
|
[11] |
PAUL C O A , MENEZES J , SCOTT A . Vanstone.handbook of applied cryptography[M]. CRC Press, 1996.
|