This paper presents an attack on Gong's proposed collisionful hash function. The weaknesses of his method are studied and possible solutions are given. Some secure methods that require additional assumptions are also suggested.
|Number of pages||12|
|Journal||Journal of Universal Computer Science|
|Publication status||Published - 1997|
- Collisionful hash functions
- Guessing attack
- Message authentication
- Safety/security in digital systems