Second Preimages for Iterated Hash Functions and their Implications on MACs

Norbert Pramstaller, Mario Lamberger, Vincent Rijmen

Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

Original languageEnglish
Title of host publicationProceedings of the 12th Australasian Conference on Information Security and Privacy - ACISP 2007
PublisherSpringer
Pages68-81
Volume4586
Publication statusPublished - 2007
EventAustralasian Conference on Information Security and Privacy - Townsville, Australia
Duration: 2 Jul 20074 Jul 2007

Publication series

NameLecture Notes in Computer Science
PublisherSpringer

Conference

ConferenceAustralasian Conference on Information Security and Privacy
Country/TerritoryAustralia
CityTownsville
Period2/07/074/07/07
  • Cryptography

    Schläffer, M., Oswald, M. E., Lipp, P., Dobraunig, C. E., Mendel, F., Eichlseder, M., Nad, T., Posch, R., Lamberger, M., Rijmen, V. & Rechberger, C.

    1/01/9531/01/19

    Project: Research area

Cite this