First Page | Document Content | |
---|---|---|
Date: 2008-07-20 11:55:06Cryptography Cryptographic hash functions Preimage attack Advantage Permutation Random oracle Birthday attack | Constructing Cryptographic Hash Functions from Fixed-Key Blockciphers Phillip Rogaway1 and John Steinberger2 1 2Add to Reading ListSource URL: web.cs.ucdavis.eduDownload Document from Source WebsiteFile Size: 238,27 KBShare Document on Facebook |