Second Preimages for Iterated Hash Functions and their Implications on MACs

Norbert Pramstaller, Mario Lamberger, Vincent Rijmen

Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

Original languageEnglish
Title of host publicationProceedings of the 12th Australasian Conference on Information Security and Privacy - ACISP 2007
PublisherSpringer
Pages68-81
Volume4586
Publication statusPublished - 2007
EventAustralasian Conference on Information Security and Privacy - Townsville, Australia
Duration: 2 Jul 20074 Jul 2007

Publication series

NameLecture Notes in Computer Science
PublisherSpringer

Conference

ConferenceAustralasian Conference on Information Security and Privacy
Country/TerritoryAustralia
CityTownsville
Period2/07/074/07/07

Cite this