Wang X Y, Feng D G, and Lai X J, et al.. Collisions for hashfunctions MD4, MD5, HAVAL-128 and RIPEMD[EB/OL].Cryptology ePrint Archive, Report 2004/199, 2004.[2]Wang X Y and Yu H B. How to break MD5 and other hashfunctions [C][J].Eurocrypt 05, Berlin.2005, LNCS 3494:19-35[3]Yu S, Yusuke N, and Jun Y, et al.. How to construct sufficientcondition in searching collisions of MD5 [EB/OL].Cryptology ePrint Archive, Report 2006/074, 2006.[4]Xie T, Feng D G, and Liu F B. A new collision differential forMD5 with its full differential path[EB/OL]. CryptologyePrint Archive, Report 2008/230, 2008.[5]Chen S W and Jin C H. An improved collision attack on MD5algorithm[C]. Third SKLOIS Conference, Inscrypt 2007,Xining, China, August 31- September 5, 2007, Lecture Notesin Computer Science, 2007, Vol. 4990: 343-357.[6]陈士伟, 金晨辉. MD5 碰撞攻击的多重消息修改技术研究. 通信学报, 2009, 30(8): 89-95.Chen S W and Jin C H. Research on the multi-messagemodification techniques on MD5[J]. Journal onCommunications, 2009, 30(8): 89-95.[7]Joux A. Multicollisions in Iterated hash functions[C].CRYPTO 2004, Berlin: Springer- Verlag, 2004. LNCS: 3152,306-316.[8]Kelsey J and Schneier B. Second preimages on n-bit hashfunctions for much less than 2n work[C]. Eurocrypt 2005,Berlin: Springer-Verlag, 2005, LNCS 3494: 19-35.[9]Kelsey J and Kohno T. Herding hash functions and theNostradamus attacl[C]. Eurocrypt 2006, Berlin: Springer-Verlag, 2006, LNCS 4004: 183-200.
|