On the weaknesses of Gong's collisionful hash function

S. Bakhtiari, R. Safavi-Naini, J. Pieprzyk

Research output: Contribution to journalArticlepeer-review

2 Citations (Scopus)

Abstract

This paper presents an attack on Gong's proposed collisionful hash function. The weaknesses of his method are studied and possible solutions are given. Some secure methods that require additional assumptions are also suggested.

Original languageEnglish
Pages (from-to)185-196
Number of pages12
JournalJournal of Universal Computer Science
Volume3
Issue number3
Publication statusPublished - 1997
Externally publishedYes

Keywords

  • Collisionful hash functions
  • Guessing attack
  • Message authentication
  • Safety/security in digital systems

Fingerprint Dive into the research topics of 'On the weaknesses of Gong's collisionful hash function'. Together they form a unique fingerprint.

Cite this