Sign in
A second preimage attack on zipper hash.
Shiwei Chen
Chenhui Jin
Published in:
Secur. Commun. Networks (2015)
Keyphrases
</>
hash functions
dual space
countermeasures
secret key
hyperplane
databases
b tree
denial of service attacks
feature selection
block cipher
malicious users
key exchange protocol