Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Conference Proceedings

Second Preimage Attacks on Dithered Hash Functions

Published: April 17, 2008

Author(s)

Elena Andreeva, Charles Bouillaguet, Pierre-Alain Fouque, Jonathan Hoch, John Kelsey, Adi Shamir, Sébastien Zimmer

Conference

Name: 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2008)
Dates: April 13-17, 2008
Location: Istanbul, Turkey
Citation: Advances in Cryptology - EUROCRYPT 2008, Lecture Notes in Computer Science vol. 4965, pp. 270-288

Abstract

Keywords

cryptanalysis; dithering; hash function
Control Families

None selected

Documentation

Publication:
Conference Proceedings (DOI)

Supplemental Material:
None available