Mathematical Research Data Initiative
Main page
Recent changes
Random page
SPARQL
MaRDI@GitHub
New item
Special pages
In other projects
MaRDI portal item
Discussion
View source
View history
English
Log in

Second Preimages for Iterated Hash Functions and Their Implications on MACs

From MaRDI portal
Publication:3608905
Jump to:navigation, search

DOI10.1007/978-3-540-73458-1_6zbMATH Open1213.94128OpenAlexW1482671317MaRDI QIDQ3608905FDOQ3608905


Authors: Norbert Pramstaller, Mario Lamberger, Vincent Rijmen Edit this on Wikidata


Publication date: 6 March 2009

Published in: Information Security and Privacy (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-540-73458-1_6




Recommendations

  • Generic universal forgery attack on iterative hash-based MACs
  • Second Preimages on n-Bit Hash Functions for Much Less than 2 n Work
  • Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions
  • Second Preimages for SMASH
  • On the security of iterated message authentication codes


zbMATH Keywords

differential cryptanalysisiterated hash functionssecond preimageblock-cipher based hash functionsdouble block-length hash functions


Mathematics Subject Classification ID

Cryptography (94A60)



Cited In (2)

  • Second Preimages on n-Bit Hash Functions for Much Less than 2 n Work
  • Second Preimage Attacks on Dithered Hash Functions





This page was built for publication: Second Preimages for Iterated Hash Functions and Their Implications on MACs

Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3608905)

Retrieved from "https://portal.mardi4nfdi.de/w/index.php?title=Publication:3608905&oldid=17038381"
Tools
What links here
Related changes
Printable version
Permanent link
Page information
This page was last edited on 5 February 2024, at 04:19. Warning: Page may not contain recent updates.
Privacy policy
About MaRDI portal
Disclaimers
Imprint
Powered by MediaWiki