--- xml/htdocs/proj/en/glep/glep-0059.html 2008/10/21 23:30:47 1.1 +++ xml/htdocs/proj/en/glep/glep-0059.html 2008/10/22 18:03:40 1.2 @@ -27,9 +27,9 @@ Title:Manifest2 hash policies and security implications -Version:1.11 +Version:1.2 -Last-Modified:2008/07/13 02:23:36 +Last-Modified:2008/10/22 17:59:43 Author:Robin Hugh Johnson <robbat2 at gentoo.org>, @@ -186,17 +186,11 @@
Patterns for the SHA-2 Family". CRYPTO 2004 Cryptology ePrint Archive, Report 2004/204. Available online from: http://eprint.iacr.org/2004/207.pdf
-
[J04] Joux, Antoie. (2004). "Multicollisions in Iterated Hash Functions
-
-
-

System Message: WARNING/2 (glep-0059.txt, line 139)

-Bullet list ends without a blank line; unexpected unindent.
-

Franklin, M. (Ed); Lecture Notes in Computer Science 3152, pp. -306-316. Available online from: -http://web.cecs.pdx.edu/~teshrim/spring06/papers/general-attacks/multi-joux.pdf

-
+
[J04] Joux, Antoie. (2004). "Multicollisions in Iterated Hash
+
Functions - Application to Cascaded Constructions;" Proceedings of +CRYPTO 2004, Franklin, M. (Ed); Lecture Notes in Computer Science +3152, pp. 306-316. Available online from: +http://web.cecs.pdx.edu/~teshrim/spring06/papers/general-attacks/multi-joux.pdf
[K06a] Klima, V. (2006). "Tunnels in Hash Functions: MD5 Collisions
Within a Minute". Cryptology ePrint Archive, Report 2006/105. Available online from: http://eprint.iacr.org/2006/105.pdf
@@ -242,7 +236,7 @@