From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from lists.gentoo.org (pigeon.gentoo.org [208.92.234.80]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by finch.gentoo.org (Postfix) with ESMTPS id 4036A1396D9 for ; Sat, 18 Nov 2017 22:21:22 +0000 (UTC) Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id 5D707E0E62; Sat, 18 Nov 2017 22:21:21 +0000 (UTC) Received: from smtp.gentoo.org (smtp.gentoo.org [IPv6:2001:470:ea4a:1:5054:ff:fec7:86e4]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by pigeon.gentoo.org (Postfix) with ESMTPS id 2C31BE0E62 for ; Sat, 18 Nov 2017 22:21:21 +0000 (UTC) Received: from oystercatcher.gentoo.org (unknown [IPv6:2a01:4f8:202:4333:225:90ff:fed9:fc84]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.gentoo.org (Postfix) with ESMTPS id 02AA533FE2A for ; Sat, 18 Nov 2017 22:21:20 +0000 (UTC) Received: from localhost.localdomain (localhost [IPv6:::1]) by oystercatcher.gentoo.org (Postfix) with ESMTP id 8975D9F6E for ; Sat, 18 Nov 2017 22:21:18 +0000 (UTC) From: "Ulrich Müller" To: gentoo-commits@lists.gentoo.org Content-Transfer-Encoding: 8bit Content-type: text/plain; charset=UTF-8 Reply-To: gentoo-dev@lists.gentoo.org, "Ulrich Müller" Message-ID: <1511043626.8c0e77f51968a2e6cb1d8e99fddb255b4dd3831e.ulm@gentoo> Subject: [gentoo-commits] data/glep:master commit in: / X-VCS-Repository: data/glep X-VCS-Files: glep-0059.rst X-VCS-Directories: / X-VCS-Committer: ulm X-VCS-Committer-Name: Ulrich Müller X-VCS-Revision: 8c0e77f51968a2e6cb1d8e99fddb255b4dd3831e X-VCS-Branch: master Date: Sat, 18 Nov 2017 22:21:18 +0000 (UTC) Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-commits@lists.gentoo.org X-Archives-Salt: 4534bd52-bdfa-4ad6-9ed0-e89f80a3f5a7 X-Archives-Hash: 0cc9cbf7dd374df94ffd817ebb118f6d commit: 8c0e77f51968a2e6cb1d8e99fddb255b4dd3831e Author: Ulrich Müller gentoo org> AuthorDate: Thu Nov 16 10:02:49 2017 +0000 Commit: Ulrich Müller gentoo org> CommitDate: Sat Nov 18 22:20:26 2017 +0000 URL: https://gitweb.gentoo.org/data/glep.git/commit/?id=8c0e77f5 glep-0059: Merge the two References sections into one. Also add a newline and remove indentation in the "Thanks to" section, so that rst2html.py will render it properly. Closes: https://bugs.gentoo.org/637668 glep-0059.rst | 100 ++++++++++++++++++++++++++++------------------------------ 1 file changed, 49 insertions(+), 51 deletions(-) diff --git a/glep-0059.rst b/glep-0059.rst index 17b7540..77ea1ab 100644 --- a/glep-0059.rst +++ b/glep-0059.rst @@ -6,7 +6,7 @@ Type: Standards Track Status: Final Version: 1 Created: 2008-10-22 -Last-Modified: 2017-11-12 +Last-Modified: 2017-11-16 Post-History: 2009-12-01, 2010-01-31 Content-Type: text/x-rst Requires: 44 @@ -168,65 +168,63 @@ For maximum compatibility, we should only have to include each of the old algorithms that we are officially still supporting, as well as the new ones that we prefer. -References -========== - -[AHS] NIST (2007). "NIST's Plan for New Cryptographic Hash Functions", - (Advanced Hash Standard). http://csrc.nist.gov/pki/HashWorkshop/ - -[BOBO06] Boneh, D. and Boyen, X. (2006). "On the Impossibility of - Efficiently Combining Collision Resistant Hash Functions"; Proceedings - of CRYPTO 2006, Dwork, C. (Ed.); Lecture Notes in Computer Science - 4117, pp. 570-583. Available online from: - http://crypto.stanford.edu/~dabo/abstracts/hashing.html - -[H04] Hawkes, P. and Paddon, M. and Rose, G. (2004). "On Corrective - Patterns for the SHA-2 Family". CRYPTO 2004 Cryptology ePrint Archive, - Report 2004/204. Available online from: - http://eprint.iacr.org/2004/207.pdf - -[J04] Joux, Antoie. (2004). "Multicollisions in Iterated Hash - Functions - Application to Cascaded Constructions;" Proceedings of - CRYPTO 2004, Franklin, M. (Ed); Lecture Notes in Computer Science - 3152, pp. 306-316. Available online from: - http://web.cecs.pdx.edu/~teshrim/spring06/papers/general-attacks/multi-joux.pdf - -[K06a] Klima, V. (2006). "Tunnels in Hash Functions: MD5 Collisions - Within a Minute". Cryptology ePrint Archive, Report 2006/105. - Available online from: http://eprint.iacr.org/2006/105.pdf - -[K06b] Klima, V. (2006). "Note and links to high-speed MD5 collision - proof of concept tools". Available online from: - http://cryptography.hyperlink.cz/2006/trick.txt - -[K08] Klima, V. (2008). "On Collisions of Hash Functions Turbo SHA-2". - Cryptology ePrint Archive, Report 2008/003. Available online from: - http://eprint.iacr.org/2008/003.pdf - -[G07] Gligoroski, D. and Knapskog, S.J. (2007). "Turbo SHA-2". - Cryptology ePrint Archive, Report 2007/403. Available online from: - http://eprint.iacr.org/2007/403.pdf - -[W04] Wang, X. et al: "Collisions for Hash Functions MD4, MD5, - HAVAL-128 and RIPEMD", rump session, CRYPTO 2004, Cryptology ePrint - Archive, Report 2004/199, first version (August 16, 2004), second - version (August 17, 2004). Available online from: - http://eprint.iacr.org/2004/199.pdf - Thanks to ========= I'd like to thank the following folks, in no specific order: - - Ciaran McCreesh (ciaranm) - for pointing out the Joux (2004) paper, - and also being stubborn enough in not accepting a partial solution. - - Marius Mauch (genone), Zac Medico (zmedico) and Brian Harring - (ferringb): for being knowledgeable about the Portage Manifest2 - codebase. + +- Ciaran McCreesh (ciaranm) - for pointing out the Joux (2004) paper, + and also being stubborn enough in not accepting a partial solution. +- Marius Mauch (genone), Zac Medico (zmedico) and Brian Harring + (ferringb): for being knowledgeable about the Portage Manifest2 + codebase. References ========== +.. [AHS] NIST (2007). "NIST's Plan for New Cryptographic Hash Functions", + (Advanced Hash Standard). http://csrc.nist.gov/pki/HashWorkshop/ + +.. [BOBO06] Boneh, D. and Boyen, X. (2006). "On the Impossibility of + Efficiently Combining Collision Resistant Hash Functions"; Proceedings + of CRYPTO 2006, Dwork, C. (Ed.); Lecture Notes in Computer Science + 4117, pp. 570-583. Available online from: + http://crypto.stanford.edu/~dabo/abstracts/hashing.html + +.. [G07] Gligoroski, D. and Knapskog, S.J. (2007). "Turbo SHA-2". + Cryptology ePrint Archive, Report 2007/403. Available online from: + http://eprint.iacr.org/2007/403.pdf + .. [GLEP44] Mauch, M. (2005) GLEP44 - Manifest2 format. https://www.gentoo.org/glep/glep-0044.html +.. [H04] Hawkes, P. and Paddon, M. and Rose, G. (2004). "On Corrective + Patterns for the SHA-2 Family". CRYPTO 2004 Cryptology ePrint Archive, + Report 2004/204. Available online from: + http://eprint.iacr.org/2004/207.pdf + +.. [J04] Joux, Antoie. (2004). "Multicollisions in Iterated Hash + Functions - Application to Cascaded Constructions;" Proceedings of + CRYPTO 2004, Franklin, M. (Ed); Lecture Notes in Computer Science + 3152, pp. 306-316. Available online from: + http://web.cecs.pdx.edu/~teshrim/spring06/papers/general-attacks/multi-joux.pdf + +.. [K06a] Klima, V. (2006). "Tunnels in Hash Functions: MD5 Collisions + Within a Minute". Cryptology ePrint Archive, Report 2006/105. + Available online from: http://eprint.iacr.org/2006/105.pdf + +.. [K06b] Klima, V. (2006). "Note and links to high-speed MD5 collision + proof of concept tools". Available online from: + http://cryptography.hyperlink.cz/2006/trick.txt + +.. [K08] Klima, V. (2008). "On Collisions of Hash Functions Turbo SHA-2". + Cryptology ePrint Archive, Report 2008/003. Available online from: + http://eprint.iacr.org/2008/003.pdf + +.. [W04] Wang, X. et al: "Collisions for Hash Functions MD4, MD5, + HAVAL-128 and RIPEMD", rump session, CRYPTO 2004, Cryptology ePrint + Archive, Report 2004/199, first version (August 16, 2004), second + version (August 17, 2004). Available online from: + http://eprint.iacr.org/2004/199.pdf + Copyright ========= Copyright (c) 2005-2010 by Robin Hugh Johnson.