Cited in
(48)- scientific article; zbMATH DE number 1542830 (Why is no real title available?)
- On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract)
- scientific article; zbMATH DE number 1504778 (Why is no real title available?)
- More permutations and involutions for constructing bent functions
- Boomerang distinguishers on MD4-family: first practical results on full 5-pass HAVAL
- A New Dedicated 256-Bit Hash Function: FORK-256
- Coding and Cryptography
- Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL
- Cryptanalysis of the Full HAVAL with 4 and 5 Passes
- New characterizations and construction methods of bent and hyper-bent Boolean functions
- scientific article; zbMATH DE number 1186881 (Why is no real title available?)
- scientific article; zbMATH DE number 1024002 (Why is no real title available?)
- scientific article; zbMATH DE number 2089142 (Why is no real title available?)
- scientific article; zbMATH DE number 1186882 (Why is no real title available?)
- Simple hash function using discrete-time quantum walks
- Security arguments for digital signatures and blind signatures
- Cryptanalysis of hash functions on the MD4-family.
- scientific article; zbMATH DE number 2077191 (Why is no real title available?)
- Cryptanalysis of the Hash Functions MD4 and RIPEMD
- How to Break MD5 and Other Hash Functions
- Hash function based on quantum walks
- scientific article; zbMATH DE number 1689008 (Why is no real title available?)
- A new one-bit difference collision attack on HAVAL-128
- Meet-in-the-Middle Attacks Using Output Truncation in 3-Pass HAVAL
- scientific article; zbMATH DE number 1980972 (Why is no real title available?)
- Nonlinearity and propagation characteristics of balanced Boolean functions
- scientific article; zbMATH DE number 1950331 (Why is no real title available?)
- ESIGN
- Second Preimage Attack on 5-Pass HAVAL and Partial Key-Recovery Attack on HMAC/NMAC-5-Pass HAVAL
- GNU Crypto
- Preimage Attacks on 3, 4, and 5-Pass HAVAL
- Information and Communications Security
- Tiger
- scientific article; zbMATH DE number 1341881 (Why is no real title available?)
- Security in Communication Networks
- Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1
- RC4-Hash: A New Hash Function Based on RC4
- Design principles for dedicated hash functions
- scientific article; zbMATH DE number 1583775 (Why is no real title available?)
- A quantum hash function with grouped coarse-grained boson sampling
- scientific article; zbMATH DE number 1950358 (Why is no real title available?)
- scientific article; zbMATH DE number 1951611 (Why is no real title available?)
- One-way hash functions with changeable parameters.
- Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5
- Open problems in hash function security
- Collision attack on the full extended MD4 and pseudo-preimage attack on RIPEMD
- scientific article; zbMATH DE number 1543053 (Why is no real title available?)
- An improved preimage attack against \texttt{HAVAL-3}
This page was built for software: HAVAL