Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Journal Article

New Second-Preimage Attacks on Hash Functions

Published: June 23, 2015
Citation: Journal of Cryptology (June 23, 2015) pp. 1-40

Author(s)

E. Andreeva, C. Bouillaguet, O. Dunkelman, P. Fouque, J. Hoch, John Kelsey, A. Shamir, S. Zimmer

Abstract

Keywords

cryptanalysis; hash function; dithering sequence; second-preimage attack; herding attack; kite generator
Control Families

None selected

Documentation

Publication:
Journal Article (DOI)

Supplemental Material:
None available