Go home now Header Background Image
Search
Submission Procedure
share: |
 
Follow us
 
 
 
 
Volume 3 / Issue 3

available in:   PDF (255 kB) PS (77 kB)
 
get:  
Similar Docs BibTeX   Write a comment
  
get:  
Links into Future
 
DOI:   10.3217/jucs-003-03-0185

 

On the Weaknesses of Gong's Collisionful Hash Function

S. Bakhtiari (Centre for Computer Security Research, University of Wollongong, Australia)

Reihaneh Safavi-Naini (Centre for Computer Security Research, University of Wollongong, Australia)

Josef Pieprzyk (Centre for Computer Security Research, University of Wollongong, Australia)

Abstract: This paper presents an attack on Gong's proposed collisionful hash function. The weaknesses of his method are studied and possible solutions are given. Some secure methods that require additional assumptions are also suggested.