[1] Damgrd I. A design principle for Hash functions//Brassard G. Advances in CRYPTO89. Berlin: Springer-Verlag, 1989: 416-427. [2] Merkle R. One way Hash functions and DES//Brassard. Advances in CRYPTO89. Berlin: Springer-Verlag, 1989: 428-446. [3] Joux A. Multicollisions in iterated Hash functions, application to cascaded constructions//Franklin M. Advances in Cryptology-CRYPTO 2004. Berlin: Springer-Verlag, 2004: 306-316. [4] Kelsey J, Schneier B. Second preimages on n-bit Hash functions for much less than 2<em>n work//Cramer R. Advances in Cryptology- EUROCRYPT 2005. Berlin: Springer-Verlag, 2005: 474-490. [5] Kelsey J, Kohno T. Herding Hash functions, the nostradamus attack//Vaudenay S. Advances in Cryptology-EUROCRYPT 2006. Berlin: Springer-Verlag, 2006: 183-200. [6] NIST. Announcing request for candidate algorithm nominations for a new cryptographic Hash algorithm (SHA-3) family . 2007(2007-11-02). http://www. buslab. org/index2. php?option=com-content&do-pdf=1&id=186713. [7] Bellare M, Ristenpart T. Multi-property-preserving Hash domain extension and the EMD transform//Lai Xuejia, Chen Kefei. Advances in Cryptology-ASIACRYPT 2006. Berlin: Springer-Verlag, 2006: 299-314. [8] Gauravaram P, Millan W, Dawson E, et al. Constructing secure Hash functions by enhancing Merkle-Damgrd construction//Batten L M, Naini R S. The 11th Australasian Conference on Information Security and Privacy. Berlin: Springer-Verlag, 2006: 407-420. [9] Filho D G, Barreto P, Rijmen V. The Mael strom-0 Hash function//Carmo L F. The 6th Brazilian Symposium on Information and Computer System Security. Brazil: Brazilian Society for Computing, 2006: 328-337. [10] Duo Lei. New integrated proof method on iterated Hash structure and new structures. 2006 (2006-11-05). http://eprint.iacr.org/2006/147.pdf. [11] Biham E, Dunkelman O. A framework for iterative Hash functions-HAIFA. NIST Second Cryptographic Hash Workshop, 2006 (2006-09-01). http://csrc.nist.gov/groups/ST/hash/documents/DUNKE-LMAN-NIST3.pdf. [12] Hirose S, Park J H, Yun A. A simple variant of the Merkle -Damgrd scheme with a permutation//Kurosawa K. Advances in Cryptology-ASIACRYPT 2007. Berlin: Springer-Verlag, 2007: 113-129. [13] Gauravaram P, Kelsey J. Cryptanalysis of a class of cryptographic Hash functions . 2007 (2007-10-20). http://eprint.iacr.org/2007/277.pdf. [14] Preneel B, Govaerts R, Vandewalle J. Hash functions based on block ciphers: a synthetic approach//Stinson D. Advances in CRYPTO 93. Berlin: Springer-Verlag, 1994: 368-378. |