The following publications are possibly variants of this publication:
- Functional Graph Revisited: Updates on (Second) Preimage Attacks on Hash CombinersZhenzhen Bao, Lei Wang 0031, Jian Guo 0001, Dawu Gu. iacr, 2017:534, 2017. [doi]
- The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash FunctionJian Guo 0001, Jérémy Jean, Gaëtan Leurent, Thomas Peyrin, Lei Wang. sacrypt 2014: 195-211 [doi]
- The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash FunctionJian Guo 0001, Jérémy Jean, Gaëtan Leurent, Thomas Peyrin, Lei Wang. iacr, 2014:675, 2014. [doi]
- The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash FunctionJian Guo 0001, Jérémy Jean, Gaëtan Leurent, Thomas Peyrin, Lei Wang. iacr, 2014:675, 2014. [doi]
- New Second-Preimage Attacks on Hash FunctionsElena Andreeva 0001, Charles Bouillaguet, Orr Dunkelman, Pierre-Alain Fouque, Jonathan J. Hoch, John Kelsey, Adi Shamir, Sébastien Zimmer. joc, 29(4):657-696, 2016. [doi]