[1]
D. Khovratovich and I. Nikoli´c, "Rotational cryptanalysis of ARX," FSE 2010. LNCS, vol. 6147, p. 333–346, 2010.## |
[2]
|
F. Mendel and T. Nad, "A Distinguisher for the Compression Function of SIMD-512," INDOCRYPT,, vol. 5922, pp. 219-232, 2010.##
|
[3]
|
I. Nikolic, J. Pieprzyk, P. law, S. lowski and R. Steinfeld, "Rotational Cryptanalysis of ((Modified) version of BMW and SIMD," 2011.##
|
[4]
|
K. Dmitry , I. Nikolic, J. Pieprzyk, P. Sokolowski and R. Steinfeld, "Rotational Cryptanalysis of ARX Revisited," IACR Cryptology ePrint Archive, 2015.##
|
[5]
|
D. Stinson, "Cryptography Theory and Practice," CRC, 2006.##
|
[6]
|
T. Peyrin, "Improved Differential Attacks for ECHO and Grøstl," Cryptology ePrint Archive, 2010.##
|
[7]
|
S. Klaus, "Cryptography and public key infrastructure on the Internet," 2003.##
|
[8]
|
X. Wang and H. Yu, "Cryptanalysis of the Compression Function of SIMD," ACISP 2011, pp. 157-171, 2011.##
|
[9]
|
D. Gligoroski, V. Klima, S. J. Knapskog, M. El-Hadedy, J. Amundsen and S. F. Mjølsnes, "Cryptographic Hash Function BLUE MIDNIGHT WISH," Submission, 2010.##
|