1 Hans Dobbertin, "RIPEMD-160: A strengthened version of RIPEMD" 71-82, 1996
2 Chiaki Ohtahara, "Preimage attacks on step-reduced RIPEMD-128 and RIPEMD-160" 169-186, 2010
3 Kazumaro Aoki, "Preimage attacks on one-block MD4, 63-step MD5 and more" 103-119, 2008
4 Florian Mendel, "On the collision resistance of RIPEMD-160" 101-116, 2006
5 Simon Knellwolf, "New preimage attacks against reduced SHA-1" 367-383, 2012
6 International Organization for Standardization, "Information technology - Security techniques - Hash-functions - Part 3: Dedicated hash functions (2004), ISO/IEC 10118-3:2004"
7 Deukjo Hong, "Improved preimage attack for 68-step HAS-160" 332-348, 2009
8 Florian Mendel, "Improved cryptanalysis of reduced RIPEMD-160" 484-503, 2013
9 Xiaoyun Wang, "How to break MD5 and other hash functions" 19-35, 2005
10 Thomas Espitau, "Higher-order differential meet-in-the-middle preimage attacks on SHA-1 and BLAKE" 683-701, 2015
1 Hans Dobbertin, "RIPEMD-160: A strengthened version of RIPEMD" 71-82, 1996
2 Chiaki Ohtahara, "Preimage attacks on step-reduced RIPEMD-128 and RIPEMD-160" 169-186, 2010
3 Kazumaro Aoki, "Preimage attacks on one-block MD4, 63-step MD5 and more" 103-119, 2008
4 Florian Mendel, "On the collision resistance of RIPEMD-160" 101-116, 2006
5 Simon Knellwolf, "New preimage attacks against reduced SHA-1" 367-383, 2012
6 International Organization for Standardization, "Information technology - Security techniques - Hash-functions - Part 3: Dedicated hash functions (2004), ISO/IEC 10118-3:2004"
7 Deukjo Hong, "Improved preimage attack for 68-step HAS-160" 332-348, 2009
8 Florian Mendel, "Improved cryptanalysis of reduced RIPEMD-160" 484-503, 2013
9 Xiaoyun Wang, "How to break MD5 and other hash functions" 19-35, 2005
10 Thomas Espitau, "Higher-order differential meet-in-the-middle preimage attacks on SHA-1 and BLAKE" 683-701, 2015
11 Aleksandar Kircanski, "Heuristic for finding compatible differential paths with application to HAS-160" 464-483, 2013
12 Telecommunications Technology Association, "Hash Function Standard Part 2: Hash Function Algorithm Standard, HAS-160 (2000), TTAS.KO-12.0011/R2"
13 Alfred J. Menezes, "Handbook of Applied Cryptography" CRC Press 1996
14 Yu Sasaki, "Finding preimages in full MD5 faster than exhaustive search" 134-152, 2009
15 Xiaoyun Wang, "Finding collisions in the full SHA-1" 17-36, 2005
16 Aaram Yun, "Finding collision on 45-step HAS-160" 146-155, 2005
17 Whitfield Diffie, "Exhaustive cryptanalysis of the NBS data encryption standard" 10 (10): 74-84, 1977
18 Yu Sasaki, "Distinguishers beyond three rounds of the RIPEMD-128/-160 compression functions" 275-292, 2012
19 Florian Mendel, "Differential attacks on reduced RIPEMD-160" 23-38, 2012
20 Xiaoyun Wang, "Cryptanalysis of the hash functions MD4 and RIPEMD" 1-18, 2005
21 Florian Mendel, "Cryptanalysis of round-reduced HAS-160" 33-47, 2011
22 Eli Biham, "Collisions of SHA-0 and reduced SHA-1" 36-57, 2005
23 Hong-Su Cho, "Collision search attack for 53-step HAS-160" 286-295, 2006
24 Florian Mendel, "Colliding message pair for 53-step HAS-160" 324-334, 2007
25 Dmitry Khovratovich, "Bicliques for preimages: Attacks on Skein-512 and the SHA-2 family" 244-263, 2012
26 Jian Guo, "Advanced meet-in-the-middle preimage attacks: First results on full Tiger, and improved results on MD4 and SHA-2" 56-75, 2010
27 Yu Sasaki, "A preimage attack for 52-step HAS-160" 302-317, 2008