@inproceedings{c814843770704ce18e9e6019ae0f6962,
title = "On selectable collisionful hash functions",
abstract = "This paper presents an attack on Gong{\textquoteright}s proposed collisionful hash function. The weaknesses of his method are studied and possible solutions are given. Some secure methods that require additional assumptions are also suggested.",
author = "S. Bakhtiari and R. Safavi-Naini and J. Pieprzyk",
year = "1996",
language = "English",
isbn = "3540619917",
volume = "1172",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer, Springer Nature",
pages = "287--298",
booktitle = "Information Security and Privacy - 1st Australasian Conference, ACISP 1996, Proceedings",
address = "United States",
note = "1st Australasian Conference on Information Security and Privacy, ACISP - 1996 ; Conference date: 24-06-1996 Through 26-06-1996",
}