Merkle R. One way Hash functions and DES//Brassard. Advances in CRYPTO89. Berlin: Springer-Verlag, 1989: 428-446.
[2]
Joux A. Multicollisions in iterated Hash functions, application to cascaded constructions//Franklin M. Advances in Cryptology-CRYPTO 2004. Berlin: Springer-Verlag, 2004: 306-316.
[3]
Kelsey J, Schneier B. Second preimages on n-bit Hash functions for much less than 2n work//Cramer R. Advances in Cryptology- EUROCRYPT 2005. Berlin: Springer-Verlag, 2005: 474-490.
[4]
Kelsey J, Kohno T. Herding Hash functions, the nostradamus attack//Vaudenay S. Advances in Cryptology-EUROCRYPT 2006. Berlin: Springer-Verlag, 2006: 183-200.
[5]
NIST. Announcing request for candidate algorithm nominations for a new cryptographic Hash algorithm (SHA-3) family . 2007(2007-11-02).
[6]
Bellare M, Ristenpart T. Multi-property-preserving Hash domain extension and the EMD transform//Lai Xuejia, Chen Kefei. Advances in Cryptology-ASIACRYPT 2006. Berlin: Springer-Verlag, 2006: 299-314.
[7]
Gauravaram P, Millan W, Dawson E, et al. Constructing secure Hash functions by enhancing Merkle-Damgrd construction//Batten L M, Naini R S. The 11th Australasian Conference on Information Security and Privacy. Berlin: Springer-Verlag, 2006: 407-420.
[8]
Filho D G, Barreto P, Rijmen V. The Mael strom-0 Hash function//Carmo L F. The 6th Brazilian Symposium on Information and Computer System Security. Brazil: Brazilian Society for Computing, 2006: 328-337.
[9]
Duo Lei. New integrated proof method on iterated Hash structure and new structures. 2006 (2006-11-05).
[10]
Biham E, Dunkelman O. A framework for iterative Hash functions-HAIFA. NIST Second Cryptographic Hash Workshop, 2006 (2006-09-01). http://csrc.nist.gov/groups/ST/hash/documents/DUNKE-LMAN-NIST3.pdf.
[11]
Preneel B, Govaerts R, Vandewalle J. Hash functions based on block ciphers: a synthetic approach//Stinson D. Advances in CRYPTO 93. Berlin: Springer-Verlag, 1994: 368-378.
[12]
Hirose S, Park J H, Yun A. A simple variant of the Merkle -Damgrd scheme with a permutation//Kurosawa K. Advances in Cryptology-ASIACRYPT 2007. Berlin: Springer-Verlag, 2007: 113-129.
[13]
Gauravaram P, Kelsey J. Cryptanalysis of a class of cryptographic Hash functions . 2007 (2007-10-20). http://eprint.iacr.org/2007/277.pdf.
[14]
Damgrd I. A design principle for Hash functions//Brassard G. Advances in CRYPTO89. Berlin: Springer-Verlag, 1989: 416-427.