Live Online Classes in Design, Coding & AI — Small Classes, Free Retakes
MIT Sloan: Lead AI Adoption Across Your Organization — Not Just Pilot It
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore a comprehensive analysis of second preimage attacks on hash combiners in this 21-minute conference talk presented at Crypto 2017. Delve into the research conducted by Zhenzhen Bao, Lei Wang, Jian Guo, and Dawu Gu as they revisit the concept of functional graphs and provide updates on cryptographic security. Gain insights into the latest developments in hash function security and the potential vulnerabilities of hash combiners. Examine the implications of these findings for cryptographic protocols and learn about the cutting-edge techniques used in analyzing hash function security.
Syllabus
Functional Graph Revisited Updates on Second Preimage Attacks on Hash Combiners
Taught by
TheIACR