New second-preimage attacks on hash functions
From MaRDI portal
Publication:321303
DOI10.1007/s00145-015-9206-4zbMath1365.94397WikidataQ57006271 ScholiaQ57006271MaRDI QIDQ321303
Pierre-Alain Fouque, Elena Andreeva, Charles Bouillaguet, Orr Dunkelman, Jonathan Hoch, John Kelsey, Adi Shamir, Sébastien Zimmer
Publication date: 13 October 2016
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00145-015-9206-4
cryptanalysis; hash function; dithering sequence; herding attack; kite generator; second-preimage attack
94A60: Cryptography
Uses Software