Star 0

Abstract

In this session, constructions of hash functions and message authentication codes from ciphers or random permutations are presented. Topic 1: Hash Functions from Defective Ideal Ciphers Authors:…