@inbook{5b725686bdd44f53923d7cd56b007474,
title = "Cryptanalysis of Lin et al.'s Efficient Block-Cipher-Based Hash Function",
abstract = "Hash functions are widely used in authentication. In this paper, the security of Lin et al.'s efficient block-cipher-based hash function is reviewed. By using Joux's multicollisions and Kelsey et al.'s expandable message techniques, we find the scheme is vulnerable to collision, preimage and second preimage attacks. Some modifications are recommended to avoid those security flaws in Lin et al.'s hash construction",
keywords = "IR-73963",
author = "Bozhong Liu and Zheng Gong and Xiaohong Chen and Weidong Qiu and Dong Zheng",
year = "2010",
doi = "10.1109/ITAPP.2010.5566639",
language = "Undefined",
isbn = "9781424451425",
publisher = "IEEE",
pages = "1--5",
booktitle = "Internet Technology and Applications, 2010 International Conference on",
address = "United States",
note = "2010 International conference on internet technology and applications ; Conference date: 20-08-2010 Through 22-08-2010",
}