On the Impact of Known-Key Attacks on Hash Functions

Conference object, Part of book or chapter of book, Other literature type English OPEN
Mennink, Bart; Preneel, Bart;

Hash functions are often constructed based on permutations or blockciphers, and security proofs are typically done in the ideal permutation or cipher model. However, once these random primitives are instantiated, vulnerabilities of these instantiations may nullify the s... View more
Share - Bookmark