Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Conference Proceedings

Second Preimage Attacks on Dithered Hash Functions

Published: April 17, 2008

Author(s)

E. Andreeva, C. Bouillaguet, P. Fouque, J. Hoch, John Kelsey, A. Shamir, S. Zimmer

Conference

Name: 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2008)
Dates: April 13-17, 2008
Location: Istanbul, Turkey
Citation: Advances in Cryptology - EUROCRYPT 2008, Lecture Notes in Computer Science vol. 4965, pp. 270-288

Abstract

Keywords

cryptanalysis; dithering; hash function
Control Families

None selected

Documentation

Publication:
Conference Proceedings (DOI)

Supplemental Material:
None available