2014
DOI: 10.1007/978-3-662-43414-7_26
|View full text |Cite
|
Sign up to set email alerts
|

Provable Second Preimage Resistance Revisited

Abstract: Abstract. Most cryptographic hash functions are iterated constructions, in which a mode of operation specifies how a compression function or a fixed permutation is applied. The Merkle-Damgård mode of operation is the simplest and more widely deployed mode of operation, yet it suffers from generic second preimage attacks, even when the compression function is ideal.In this paper we focus on provable security against second preimage attacks. Based on the study of several existing constructions, we describe simpl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Publication Types

Select...

Relationship

0
0

Authors

Journals

citations
Cited by 0 publications
references
References 15 publications
0
0
0
Order By: Relevance

No citations

Set email alert for when this publication receives citations?