Second Preimages for Iterated Hash Functions and their Implications on MACs

Norbert Pramstaller, Mario Lamberger, Vincent Rijmen

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Original languageEnglish
Title of host publicationProceedings of the 12th Australasian Conference on Information Security and Privacy - ACISP 2007
PublisherSpringer
Pages68-81
Volume4586
Publication statusPublished - 2007
EventAustralasian Conference on Information Security and Privacy - Townsville, Australia
Duration: 2 Jul 20074 Jul 2007

Publication series

NameLecture Notes in Computer Science
PublisherSpringer

Conference

ConferenceAustralasian Conference on Information Security and Privacy
CountryAustralia
CityTownsville
Period2/07/074/07/07

Cite this

Pramstaller, N., Lamberger, M., & Rijmen, V. (2007). Second Preimages for Iterated Hash Functions and their Implications on MACs. In Proceedings of the 12th Australasian Conference on Information Security and Privacy - ACISP 2007 (Vol. 4586, pp. 68-81). (Lecture Notes in Computer Science). Springer.

Second Preimages for Iterated Hash Functions and their Implications on MACs. / Pramstaller, Norbert; Lamberger, Mario; Rijmen, Vincent.

Proceedings of the 12th Australasian Conference on Information Security and Privacy - ACISP 2007. Vol. 4586 Springer, 2007. p. 68-81 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearchpeer-review

Pramstaller, N, Lamberger, M & Rijmen, V 2007, Second Preimages for Iterated Hash Functions and their Implications on MACs. in Proceedings of the 12th Australasian Conference on Information Security and Privacy - ACISP 2007. vol. 4586, Lecture Notes in Computer Science, Springer, pp. 68-81, Australasian Conference on Information Security and Privacy, Townsville, Australia, 2/07/07.
Pramstaller N, Lamberger M, Rijmen V. Second Preimages for Iterated Hash Functions and their Implications on MACs. In Proceedings of the 12th Australasian Conference on Information Security and Privacy - ACISP 2007. Vol. 4586. Springer. 2007. p. 68-81. (Lecture Notes in Computer Science).
Pramstaller, Norbert ; Lamberger, Mario ; Rijmen, Vincent. / Second Preimages for Iterated Hash Functions and their Implications on MACs. Proceedings of the 12th Australasian Conference on Information Security and Privacy - ACISP 2007. Vol. 4586 Springer, 2007. pp. 68-81 (Lecture Notes in Computer Science).
@inproceedings{1cd488155a234ce08a64e25a785a0ee4,
title = "Second Preimages for Iterated Hash Functions and their Implications on MACs",
author = "Norbert Pramstaller and Mario Lamberger and Vincent Rijmen",
year = "2007",
language = "English",
volume = "4586",
series = "Lecture Notes in Computer Science",
publisher = "Springer",
pages = "68--81",
booktitle = "Proceedings of the 12th Australasian Conference on Information Security and Privacy - ACISP 2007",

}

TY - GEN

T1 - Second Preimages for Iterated Hash Functions and their Implications on MACs

AU - Pramstaller, Norbert

AU - Lamberger, Mario

AU - Rijmen, Vincent

PY - 2007

Y1 - 2007

M3 - Conference contribution

VL - 4586

T3 - Lecture Notes in Computer Science

SP - 68

EP - 81

BT - Proceedings of the 12th Australasian Conference on Information Security and Privacy - ACISP 2007

PB - Springer

ER -