First Page | Document Content | |
---|---|---|
Date: 2012-06-20 08:49:50Hash function Collision resistance Birthday attack Preimage attack Collision attack MDC-2 One-way compression function Cryptography Cryptographic hash functions Espionage | How to Construct Double-Block-Length Hash Functions ∗ Shoichi HiroseAdd to Reading ListSource URL: csrc.nist.govDownload Document from Source WebsiteFile Size: 724,94 KBShare Document on Facebook |