Hash function security summary (English Wikipedia)

Analysis of information sources in references of the Wikipedia article "Hash function security summary" in English language version.

refsWebsite
Global rank English rank
2nd place
2nd place
5,032nd place
3,357th place
low place
low place
4,521st place
4,877th place
1st place
1st place
207th place
136th place
low place
low place
11th place
8th place
18th place
17th place
low place
low place
4,725th place
3,556th place
4,903rd place
3,679th place
low place
8,415th place
low place
low place
388th place
265th place

arstechnica.com

doi.org

epfl.ch

documents.epfl.ch

harvard.edu

ui.adsabs.harvard.edu

  • Yu Sasaki; Yusuke Naito; Noboru Kunihiro; Kazuo Ohta (2007-03-22). "Improved Collision Attacks on MD4 and MD5". IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E90-A (1): 36–47. Bibcode:2007IEITF..90...36S. doi:10.1093/ietfec/e90-a.1.36.

iacr.org

eprint.iacr.org

  • Tao Xie; Fanbao Liu; Dengguo Feng (25 March 2013). "Fast Collision Attack on MD5". IACR Cryptol. ePrint Arch.
  • Gaëtan Leurent; Thomas Peyrin (2020-01-08). SHA-1 is a Shambles: First Chosen-Prefix Collision on SHA-1 and Application to the PGP Web of Trust (PDF). USENIX Security Symposium. SEC'20. Vol. 29. USENIX Association. pp. 1839–1856. ISBN 978-1-939133-17-5.
  • LI Ji; XU Liangyu (2009-05-26). "Attacks on Round-Reduced BLAKE". IACR Cryptol. ePrint Arch.
  • Yu Sasaki; Lei Wang; Kazumaro Aoki (2008-11-25). "Preimage Attacks on 41-Step SHA-256 and 46-Step SHA-512". IACR Cryptol. ePrint Arch.
  • Xiaoyun Wang; Dengguo Feng; Xuejia Lai; Hongbo Yu (2004-08-17). "Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD". Cryptology ePrint Archive.
  • Thomas Fuhr; Thomas Peyrin (2008-12-04). Cryptanalysis of RadioGatun. FSE 2009.
  • Zongyue Wang; Hongbo Yu; Xiaoyun Wang (2013-09-10). "Cryptanalysis of GOST R hash function". Information Processing Letters. 114 (12): 655–662. doi:10.1016/j.ipl.2014.07.007.
  • Søren S. Thomsen (2008). "An improved preimage attack on MD2". Cryptology ePrint Archive.
  • Jian Guo; Jérémy Jean; Gaëtan Leurent; Thomas Peyrin; Lei Wang (2014-08-29). The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function. SAC 2014.
  • Jian Guo; San Ling; Christian Rechberger; Huaxiong Wang (2010-12-06). Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2. Asiacrypt 2010. pp. 12–17.

iacr.org

improsec.com

inria.fr

who.rocq.inria.fr

kuleuven.be

cosic.esat.kuleuven.be

noekeon.org

radiogatun.noekeon.org

psu.edu

citeseerx.ist.psu.edu

sdu.edu.cn

infosec.sdu.edu.cn

semanticscholar.org

api.semanticscholar.org

tugraz.at

online.tugraz.at

web.archive.org

yp.to

bench.cr.yp.to