<--- Back to Details
First PageDocument Content
Cryptography / Cryptographic hash functions / Preimage attack / Advantage / Permutation / Random oracle / Birthday attack
Date: 2008-07-20 11:55:06
Cryptography
Cryptographic hash functions
Preimage attack
Advantage
Permutation
Random oracle
Birthday attack

Constructing Cryptographic Hash Functions from Fixed-Key Blockciphers Phillip Rogaway1 and John Steinberger2 1 2

Add to Reading List

Source URL: web.cs.ucdavis.edu

Download Document from Source Website

File Size: 238,27 KB

Share Document on Facebook

Similar Documents