U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

This is an archive
(replace .gov by .rip)

Journal Article

New Second-Preimage Attacks on Hash Functions

Published: June 23, 2015
Citation: Journal of Cryptology (June 23, 2015) pp. 1-40

Author(s)

Elena Andreeva (KU Leuven), Charles Bouillaguet (Université Lille 1), Orr Dunkelman (University of Haifa), Pierre-Alain Fouque (Université Rennes 1), Jonathan Hoch (Weizmann Institute of Science), John Kelsey (NIST), Adi Shamir (Weizmann Institute of Science), Sébastien Zimmer (École Normale Supérieure - CNRS)

Announcement

Abstract

Keywords

cryptanalysis; hash function; dithering sequence; second-preimage attack; herding attack; kite generator
Control Families

None selected

Documentation

Publication:
Journal Article (DOI)

Supplemental Material:
None available

Document History:
06/23/15: Journal Article (Final)

Topics

Security and Privacy
secure hashing