Cryptology ePrint Archive: Report 2004/253

Available versions in chronological order


Design Principles for Iterated Hash Functions
Stefan Lucks
Publication Info: hash function, Joux attack, provable security, black-box model


[ Cryptology ePrint archive ]