Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Analysis of Zipper as a Hash Function

    At CRYPTO 2005, Coron etc. proposed several modified methods to make the usual hash functions based on MD method indifferentiable from random oracles. However, the compression functions used in Coron’s schemes...

    Pin Lin, Wenling Wu, Chuankun Wu, Tian Qiu in Information Security Practice and Experience (2008)