Cryptology ePrint Archive: Report 2004/253
Available versions in chronological order
20040929:003615 (posted 29-Sep-2004 00:36:15 UTC)
Design Principles for Iterated Hash Functions
Stefan Lucks
Publication Info: hash function, Joux attack, provable security, black-box model
[
Cryptology ePrint archive
]