A Second Preimage Attack on the XOR Hash Combiner
The exclusive-or (XOR) hash combiner is a classical hash function combiner, which is well known as a good PRF and MAC combiner, and is used in practice in TLS versions 1.0 and 1.1. In this work, we analyze the second preimage resistance of the XOR combiner underlying two different narrow-pipe hash f...
Saved in:
Main Authors: | Shiwei Chen, Ting Cui, Chenhui Jin, Congjun Wang |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2024-01-01
|
Series: | IET Information Security |
Online Access: | http://dx.doi.org/10.1049/2024/1230891 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Preimage attacks on reduced‐round Keccak hash functions by solving algebraic systems
by: Junling Pei, et al.
Published: (2023-05-01) -
XOR-FREE Implementation of Convolutional Encoder for Reconfigurable Hardware
by: Gaurav Purohit, et al.
Published: (2016-01-01) -
An efficient XOR-based visual cryptography scheme with lossless reconfigurable algorithms
by: Huan Wang, et al.
Published: (2022-04-01) -
Indifferentiable hash functions in the standard model
by: Juha Partala
Published: (2021-07-01) -
Analysis of the amplitude form of the quantum hash function
by: M. F. Ablayev, et al.
Published: (2023-11-01)