[1] DOBBERTIN H,BOSSELAERS A,PRENEEL B.RIPEMD-160:a strengthened version of RIPEMD[C]//Proceedings of International Workshop on Fast Software Encryption.Cambridge,UK:[s.n.],1996:71-82. [2] DAMGÅRD I B.A design principle for Hash functions[C]//Proceedings of Conference on the Theory and Application of Cryptology.Santa Barbara,USA:[s.n.],1989:416-427. [3] MERKLE R C.One way Hash functions and DES[C]//Proceedings of Conference on the Theory and Application of Cryptology.Santa Barbara,USA:[s.n.],1989:428-446. [4] MENDEL F,NAD T,SCHERZ S,et al.Differential attacks on reduced RIPEMD-160[C]//Proceedings of International Conference on Information Security.Seoul,Korea:[s.n.],2012:23-38. [5] MENDEL F,PEYRIN T,SCHLÄFFER M,et al.Improved cryptanalysis of reduced RIPEMD-160[C]//Proceedings of International Conference on the Theory and Application of Cryptology and Information Security.Bengaluru,India:[s.n.],2013:484-503. [6] LIU Fukang,MENDEL F,WANG Gaoli.Collisions and semi-free-start collisions for round-reduced RIPEMD-160[C]//Proceedings of International Conference on the Theory and Application of Cryptology and Information Security.Paris,France:[s.n.],2017:158-186. [7] WANG Gaoli,SHEN Yanzhao,LIU Fukang.Cryptanalysis of 48-step RIPEMD-160[J].IACR Transactions on Symmetric Cryptology,2017(2):177-202. [8] OHTAHARA C,SASAKI Y,SHIMOYAMA T.Preimage attacks on step-reduced RIPEMD-128 and RIPEMD-160[C]//Proceedings of International Conference on Information Security and Cryptology.Singapore:[s.n.],2010:169-186. [9] 申延召.约减轮Hash函数HAS-160、RIPEMD-160和SM3的原像攻击[D].济南:山东大学,2018. [10] SASAKI Y,WANG L.Distinguishers beyond three rounds of the RIPEMD-128/-160 compression functions[J].Lecture Notes in Computer Science,2012,7341:275-292. [11] WAGNER D.The boomerang attack[C]//Proceedings of International Workshop on Fast Software Encryption.Rome,Italy:[s.n.],1999:156-170. [12] BIRYUKOV A,NIKOLIC' I,ROY A.Boomerang attacks on BLAKE-32[C]//Proceedings of International Workshop on Fast Software Encryption.Lyngby,Denmark:[s.n.],2011:218-237. [13] 吴广辉,于红波,郝泳霖.对约减轮数Skein-1024的Boomerang区分攻击[J].密码学报,2016,3(5):492-504. [14] WANG Xiaoyun,LAI Xuejia,FENG Dengguo,et al.Cryptanalysis of the Hash functions MD4 and RIPEMD[C]//Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques.Aarhus,Denmark:[s.n.],2005:1-18. [15] WANG Xiaoyun,YU Hongbo.How to break MD5 and other Hash functions[C]//Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques.Aarhus,Denmark:[s.n.],2005:19-35. [16] WANG Xiaoyun,YIN Y L,YU Hongbo.Finding collisions in the full SHA-1[C]//Proceedings of Annual International Cryptology Conference.Santa Barbara,USA:[s.n.],2005:17-36. |