Constructions of Hash Functions and Message Authentication Codes
Star 0
Share
Abstract
In this session, constructions of hash functions and message authentication codes from ciphers or random permutations are presented. Topic 1: Hash Functions from Defective Ideal Ciphers Authors:…