On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA0 and SHA1
Related-Key Rectangle Attacks on Reduced Versions of SHACAL-1 and AES192
Related-Key Attacks on Reduced Rounds of SHACAL-2
Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1