Second Preimages for Iterated Hash Functions and Their Implications on MACs
From MaRDI portal
Publication:3608905
DOI10.1007/978-3-540-73458-1_6zbMATH Open1213.94128OpenAlexW1482671317MaRDI QIDQ3608905FDOQ3608905
Authors: Norbert Pramstaller, Mario Lamberger, Vincent Rijmen
Publication date: 6 March 2009
Published in: Information Security and Privacy (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-73458-1_6
Recommendations
differential cryptanalysisiterated hash functionssecond preimageblock-cipher based hash functionsdouble block-length hash functions
Cited In (2)
This page was built for publication: Second Preimages for Iterated Hash Functions and Their Implications on MACs
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3608905)