U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

Conference Paper

Second Preimage Attacks on Dithered Hash Functions

Published: April 17, 2008

Author(s)

Elena Andreeva, Charles Bouillaguet, Pierre-Alain Fouque, Jonathan Hoch, John Kelsey, Adi Shamir, Sébastien Zimmer

Conference

Name: 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2008)
Dates: 04/13/2008 - 04/17/2008
Location: Istanbul, Turkey
Citation: Advances in Cryptology - EUROCRYPT 2008, vol. 4965, pp. 270-288

Abstract

Keywords

cryptanalysis; dithering; hash function
Control Families

None selected

Documentation

Publication:
https://doi.org/10.1007/978-3-540-78967-3_16

Supplemental Material:
None available

Document History:
04/17/08: Conference Paper (Final)