Aoki, Kazumaro; Guo, Jian; Matusiewicz, Krystian; Sasaki, Yu & Wang, Lei (2009). "Preimages for Step-Reduced SHA-2". Advances in Cryptology – ASIACRYPT 2009. Lecture Notes in Computer Science. Vol. 5912. Springer Berlin Heidelberg. pp. 578–597. doi:10.1007/978-3-642-10366-7_34. ISBN978-3-642-10366-7. ISSN0302-9743.
Guo, Jian; Ling, San; Rechberger, Christian & Wang, Huaxiong (2010). "Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2". Advances in Cryptology – ASIACRYPT 2010(PDF). Lecture Notes in Computer Science. Vol. 6477. Springer Berlin Heidelberg. pp. 56–75. doi:10.1007/978-3-642-17373-8_4. ISBN978-3-642-17373-8. ISSN0302-9743. Archived(PDF) from the original on 2022-03-03. Retrieved 2022-02-15.
Marc Stevens; Elie Bursztein; Pierre Karpman; Ange Albertini; Yarik Markov; Alex Petit Bianco; Clement Baisse (February 23, 2017). "Announcing the first SHA1 collision". Google Security Blog.
Guo, Jian; Ling, San; Rechberger, Christian & Wang, Huaxiong (2010). "Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2". Advances in Cryptology – ASIACRYPT 2010(PDF). Lecture Notes in Computer Science. Vol. 6477. Springer Berlin Heidelberg. pp. 56–75. doi:10.1007/978-3-642-17373-8_4. ISBN978-3-642-17373-8. ISSN0302-9743. Archived(PDF) from the original on 2022-03-03. Retrieved 2022-02-15.
Dobraunig, Christoph; Eichlseder, Maria & Mendel, Florian (2016). "Analysis of SHA-512/224 and SHA-512/256"(PDF). International Association for Cryptologic Research. Archived(PDF) from the original on 2017-07-15. Retrieved 2016-04-15.
Marc Stevens; Elie Bursztein; Pierre Karpman; Ange Albertini; Yarik Markov; Alex Petit Bianco; Clement Baisse (February 23, 2017). "Announcing the first SHA1 collision". Google Security Blog.
Guo, Jian; Ling, San; Rechberger, Christian & Wang, Huaxiong (2010). "Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2". Advances in Cryptology – ASIACRYPT 2010(PDF). Lecture Notes in Computer Science. Vol. 6477. Springer Berlin Heidelberg. pp. 56–75. doi:10.1007/978-3-642-17373-8_4. ISBN978-3-642-17373-8. ISSN0302-9743. Archived(PDF) from the original on 2022-03-03. Retrieved 2022-02-15.
Dobraunig, Christoph; Eichlseder, Maria & Mendel, Florian (2016). "Analysis of SHA-512/224 and SHA-512/256"(PDF). International Association for Cryptologic Research. Archived(PDF) from the original on 2017-07-15. Retrieved 2016-04-15.
Aoki, Kazumaro; Guo, Jian; Matusiewicz, Krystian; Sasaki, Yu & Wang, Lei (2009). "Preimages for Step-Reduced SHA-2". Advances in Cryptology – ASIACRYPT 2009. Lecture Notes in Computer Science. Vol. 5912. Springer Berlin Heidelberg. pp. 578–597. doi:10.1007/978-3-642-10366-7_34. ISBN978-3-642-10366-7. ISSN0302-9743.
Guo, Jian; Ling, San; Rechberger, Christian & Wang, Huaxiong (2010). "Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2". Advances in Cryptology – ASIACRYPT 2010(PDF). Lecture Notes in Computer Science. Vol. 6477. Springer Berlin Heidelberg. pp. 56–75. doi:10.1007/978-3-642-17373-8_4. ISBN978-3-642-17373-8. ISSN0302-9743. Archived(PDF) from the original on 2022-03-03. Retrieved 2022-02-15.