U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

This is an archive
(replace .gov by .rip)

Conference Proceedings

Herding, Second Preimage, and Trojan Message Attacks Beyond Merkle-Damgård

Published: November 03, 2009

Author(s)

Elena Andreeva, Charles Bouillaguet, Orr Dunkelman, John Kelsey

Conference

Name: 16th International Workshop, Selected Areas in Cryptography (SAC 2009)
Dates: August 13-14, 2009
Location: Calgary, Alberta, Canada
Citation: Selected Areas in Cryptography, Lecture Notes in Computer Science vol. 5867, pp. 393-414

Announcement

Abstract

Keywords

concatenated hash; herding attack; second preimage attack; tree hash; Trojan message attack; zipper hash
Control Families

None selected

Documentation

Publication:
Conference Proceedings (DOI)

Supplemental Material:
None available

Document History:
11/03/09: Conference Proceedings (Final)