Trojan message attack on the concatenated hash functions
The Trojan message attack was proposed by Andreeva,et al.aiming at the hash functions with MD structure.First it was applied on the hash function beyond MD structure,that was,concatenated hash.Utilizing the property of the concatenated hash,and combining the Joux's multicollision and the “diamo...
Saved in:
Main Authors: | Shi-Wei CHEN, INChen-Hui J |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2016-08-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2016154/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Preimage attacks on reduced‐round Keccak hash functions by solving algebraic systems
by: Junling Pei, et al.
Published: (2023-05-01) -
Preimage and pseudo-collision attacks on 29-step SM3 hash function with padding
by: Gao-li WANG, et al.
Published: (2014-02-01) -
Preimage and pseudo collision attacks on round-reduced DHA-256 hash function
by: Jian ZOU, et al.
Published: (2013-06-01) -
Dual-branch autoencoder network for attacking deep hashing image retrieval models
by: Sizheng FU, et al.
Published: (2023-11-01) -
Improved preimage and pseudo-collision attacks on SM3 hash function
by: Jian ZOU, et al.
Published: (2018-01-01)