MeshHash2
B Fay - Cryptology ePrint Archive, 2009 - eprint.iacr.org
This specification describes a modification of a candidate for SHA-3, named MeshHash. The
first version had a flaw in it, it was possible to mount a second preimage attack [Tho08]. So …
first version had a flaw in it, it was possible to mount a second preimage attack [Tho08]. So …