The End Previous Table of Contents

References

Chapter 18 of Schneier [SCH] provides a good, although already a bit dated, introduction to one-way hash functions. I have, sometimes, choosen to be a bit cautious and call these "chain hash" functions since none have been proven to be one-way.
  1. [BOS] Bosselaers, Antoon, "Even Faster Hashing On the Pentium", 1997.
  2. [BGV] Bosselaers, Govaerts, and Vandewalle, "Fast Hashing on the Pentium," Advances in Cryptology---Crypto '96, Springer-Verlag, pages 298-312, 1996.
  3. [DBP] Dobbertin, Bosselaers, and Prenell, "RIPEMD-160: A Strengthened Version of RIPEMD," Fast Software Encryption, Lecture Notes in Computer Science, 1039, Springer-Verlag, pages 71-82, 1996. (Note: the version available through the link corrects some errors and provides a C reference implementation.)
  4. [DOBa] Dobbertin, Hans "Cryptanalysis of MD4," Fast Software Encryption, Lecture Notes in Computer Science, 1039, Springer-Verlag, pages 293-304, 1996.
  5. [DOBb] Dobbertin, Hans, "Cryptanalysis of MD5 Compress."
  6. [NISTa] NIST, "Secure Hash Standard", FIPS 180, United States Department of Commerce, 1993.
  7. [NISTb] NIST, "Secure Hash Standard", FIPS 180-1, United States Department of Commerce, 1995.
  8. [RIV] Rivest, Ronald, "The MD5 Message-Digest Algorithm", available as RFC 1321, 1992.
  9. [SCH] Schneier, Bruce, Applied Cryptography. Second Edition: Protocols, Algoritms, and Source Code in C, John Wiley and Sons, Inc., 1996

The End Previous Table of Contents