A Second Preimage Attack on the XOR Hash Combiner
The exclusive-or (XOR) hash combiner is a classical hash function combiner, which is well known as a good PRF and MAC combiner, and is used in practice in TLS versions 1.0 and 1.1. In this work, we analyze the second preimage resistance of the XOR combiner underlying two different narrow-pipe hash f...
Saved in:
Main Authors: | Shiwei Chen, Ting Cui, Chenhui Jin, Congjun Wang |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2024-01-01
|
Series: | IET Information Security |
Online Access: | http://dx.doi.org/10.1049/2024/1230891 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Improved preimage and pseudo-collision attacks on SM3 hash function
by: Jian ZOU, et al.
Published: (2018-01-01) -
Preimage attacks on reduced‐round Keccak hash functions by solving algebraic systems
by: Junling Pei, et al.
Published: (2023-05-01) -
Preimage and pseudo collision attacks on round-reduced DHA-256 hash function
by: Jian ZOU, et al.
Published: (2013-06-01) -
Preimage and pseudo-collision attacks on 29-step SM3 hash function with padding
by: Gao-li WANG, et al.
Published: (2014-02-01) -
Trojan message attack on the concatenated hash functions
by: Shi-Wei CHEN, et al.
Published: (2016-08-01)