Wang, Xiaoyun; Yin, Yiqun Lisa; Yu, Hongbo (2005). "Finding Collisions in the Full SHA-1". Advances in Cryptology – CRYPTO 2005. Lecture Notes in Computer Science. Vol. 3621. pp. 17–36. doi:10.1007/11535218_2. ISBN978-3-540-31870-5.(subscription required)
Hong, Deukjo; Chang, Donghoon; Sung, Jaechul; Lee, Sangjin; Hong, Seokhie; Lee, Jaesang; Moon, Dukjae; Chee, Sungtaek (2006). "A New Dedicated 256-Bit Hash Function: FORK-256". Fast Software Encryption. Lecture Notes in Computer Science. Vol. 4047. pp. 195–209. doi:10.1007/11799313_13. ISBN978-3-540-36598-3.
Saarinen, Markku-Juhani (2007). "A Meet-in-the-Middle Collision Attack Against the New FORK-256". Progress in Cryptology – INDOCRYPT 2007. Lecture Notes in Computer Science. Vol. 4859. Springer Berlin Heidelberg. pp. 10–17. CiteSeerX10.1.1.62.5191. doi:10.1007/978-3-540-77026-8_2. ISBN978-3-540-77026-8.(subscription required)
Mendel, Florian; Lano, Joseph; Preneel, Bart (2006). "Cryptanalysis of Reduced Variants of the FORK-256 Hash Function". Topics in Cryptology – CT-RSA 2007. Lecture Notes in Computer Science. Vol. 4377. Springer Berlin Heidelberg. pp. 85–100. doi:10.1007/11967668_6. ISBN978-3-540-69328-4.(subscription required)
Matusiewicz, Krystian; Peyrin, Thomas; Billet, Olivier; Contini, Scott; Pieprzyk, Josef (2007). "Cryptanalysis of FORK-256". Fast Software Encryption. Lecture Notes in Computer Science. Vol. 4593. pp. 19–38. doi:10.1007/978-3-540-74619-5_2. ISBN978-3-540-74619-5.(subscription required)
Contini, Scott; Matusiewicz, Krystian; Pieprzyk, Josef (2007). "Extending FORK-256 Attack to the Full Hash Function". Information and Communications Security. Lecture Notes in Computer Science. Vol. 4861. Springer Berlin Heidelberg. pp. 296–305. doi:10.1007/978-3-540-77048-0_23. ISBN978-3-540-77048-0. S2CID15215802.
Saarinen, Markku-Juhani (2007). "A Meet-in-the-Middle Collision Attack Against the New FORK-256". Progress in Cryptology – INDOCRYPT 2007. Lecture Notes in Computer Science. Vol. 4859. Springer Berlin Heidelberg. pp. 10–17. CiteSeerX10.1.1.62.5191. doi:10.1007/978-3-540-77026-8_2. ISBN978-3-540-77026-8.(subscription required)
randombit.net
lists.randombit.net
Lloyd, Jack (25 May 2010), Removing FORK-256, Botan-devel mailing list
schneier.com
Schneier, Bruce (15 February 2005). "SHA-1 Broken". Schneier on Security.
semanticscholar.org
api.semanticscholar.org
Contini, Scott; Matusiewicz, Krystian; Pieprzyk, Josef (2007). "Extending FORK-256 Attack to the Full Hash Function". Information and Communications Security. Lecture Notes in Computer Science. Vol. 4861. Springer Berlin Heidelberg. pp. 296–305. doi:10.1007/978-3-540-77048-0_23. ISBN978-3-540-77048-0. S2CID15215802.