Welcome to the resource topic for 2011/307
Title:
Ways to restrict the differential path
Authors: ZiJie Xu, Ke Xu
Abstract:People had developed some attack methods to attack hash function. These methods need to choose some “differential pattern”[Dau05]. We present a way to restrict the collisions that hold the “differential pattern”. At the same time, to build a hash function that meet the different needs, we propose a construction.
ePrint: https://eprint.iacr.org/2011/307
See all topics related to this paper.
Feel free to post resources that are related to this paper below.
Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.
For more information, see the rules for Resource Topics .