Preneel et al., "MDx-MAC and Building Fast MACs from Hash Functions", Katholieke Universiteit Leuven, Dept. Electrical Engineering-ESAT, (1995) pp. 1-14. |
Krawczyk, "LFSR-based Hashing and Authentication", Advances in Cryptology, Proc. Crypto '94, LNCS 839, Y. Desmedt, Ed., Springer-Verlag, (1994), pp. 129-139. |
Rivest, "The MD4 Message Digest Algorithm", Advances in Cryptology, Proc. Crypto '90, LNCS 537, S. Vanstone, Ed., Springer-Verlag, (1991), pp. 303-311. |
Rivest, "The MD5 Message Digest Algorithm", Request for Comments (RFC) 1320, Intenet Activities Board, Internet Privacy Task Force, (1991), pp. 1-22. |
"Race Integrity Primitives Evaluation (RIPE-RACE 1040): Final Report," LNCS volume, Springer-Verlag, (to appear), pp. 71-112. |
"Proposed Revision of FIPS 180, Secure Hash Standard", Federal Register, (1994), pp. 1-22. |
B. den Boer et al., "An Attack on the Last Two Rounds of MD4", Advances in Cryptology, Proc. Crypto '91, LNCS 576, J. Feigenbaum, Ed., Springer-Verlag, (1992) pp. 194-203. |
Vaudenay, "On the Need for Multipermutations: Cryptanalysis of MD4 and SAFER", Research Repport of LIENS-94-23, Ecole Normale Superieure, Paris, (1994), pp. 1-6. |
B. den Boer, "Collisions for the Compression Function of MD5", Advances in Cryptology, Proc. Eurocrypto '93, LNCS 765, T. Helleseth, Ed., Springer-Verlag, (1994), pp. 293-304. |