On selectable collisionful hash functions

S. Bakhtiari, R. Safavi-Naini, J. Pieprzyk

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

1 Citation (Scopus)


This paper presents an attack on Gong’s proposed collisionful hash function. The weaknesses of his method are studied and possible solutions are given. Some secure methods that require additional assumptions are also suggested.

Original languageEnglish
Title of host publicationInformation Security and Privacy - 1st Australasian Conference, ACISP 1996, Proceedings
Place of PublicationBerlin; Heidelberg
PublisherSpringer, Springer Nature
Number of pages12
ISBN (Print)3540619917, 9783540619918
Publication statusPublished - 1996
Externally publishedYes
Event1st Australasian Conference on Information Security and Privacy, ACISP - 1996 - Wollongong, Australia
Duration: 24 Jun 199626 Jun 1996

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
ISSN (Print)03029743
ISSN (Electronic)16113349


Other1st Australasian Conference on Information Security and Privacy, ACISP - 1996

Fingerprint Dive into the research topics of 'On selectable collisionful hash functions'. Together they form a unique fingerprint.

Cite this