Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Journal Article

New Second-Preimage Attacks on Hash Functions

Published: June 23, 2015
Citation: Journal of Cryptology (June 23, 2015) pp. 1-40

Author(s)

Elena Andreeva (KU Leuven), Charles Bouillaguet (Université Lille 1), Orr Dunkelman (University of Haifa), Pierre-Alain Fouque (Université Rennes 1), Jonathan Hoch (Weizmann Institute of Science), John Kelsey (NIST), Adi Shamir (Weizmann Institute of Science), Sébastien Zimmer (École Normale Supérieure - CNRS)

Abstract

Keywords

cryptanalysis; hash function; dithering sequence; second-preimage attack; herding attack; kite generator
Control Families

None selected

Documentation

Publication:
Journal Article (DOI)

Supplemental Material:
None available

Topics

Security and Privacy
secure hashing