Skip to main content

Methods of attack on hash functions

  • Chapter
  • First Online:
Design of Hashing Algorithms

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 756))

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Editor information

Josef Pieprzyk Babak Sadeghiyan

Rights and permissions

Reprints and permissions

Copyright information

© 1993 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

(1993). Methods of attack on hash functions. In: Pieprzyk, J., Sadeghiyan, B. (eds) Design of Hashing Algorithms. Lecture Notes in Computer Science, vol 756. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-57500-6_3

Download citation

  • DOI: https://doi.org/10.1007/3-540-57500-6_3

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-57500-9

  • Online ISBN: 978-3-540-48198-0

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics