U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

This is an archive
(replace .gov by .rip)

Conference Proceedings

Second Preimage Attacks on Dithered Hash Functions

Published: April 17, 2008

Author(s)

Elena Andreeva, Charles Bouillaguet, Pierre-Alain Fouque, Jonathan Hoch, John Kelsey, Adi Shamir, Sébastien Zimmer

Conference

Name: 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2008)
Dates: April 13-17, 2008
Location: Istanbul, Turkey
Citation: Advances in Cryptology - EUROCRYPT 2008, Lecture Notes in Computer Science vol. 4965, pp. 270-288

Announcement

Abstract

Keywords

cryptanalysis; dithering; hash function
Control Families

None selected

Documentation

Publication:
Conference Proceedings (DOI)

Supplemental Material:
None available

Document History:
04/17/08: Conference Proceedings (Final)