@inproceedings{0fd4d4ba79554ec4898f63c8b48564b9,
title = "Variants of multicollision attacks on iterated hash functions",
abstract = "We introduce a statistical experiment setting to carry out a multicollision attack on any iterated hash function. We develop a method for finding multicollisions that gives larger multicollision sets for the same amount of work as Joux's famous method i.e. with 2.5·k2n/2 work one can find greater than 2k-collisions for large k. Furthermore, if the message length is not restricted, we show that we can create arbitrarily large multicollisions by finding two cycles in the iterated hash function. This applies even when an ideal compression function is used.",
author = "Tuomas Kortelainen and Juha Kortelainen and Kimmo Halunen",
year = "2011",
doi = "10.1007/978-3-642-21518-6_11",
language = "English",
isbn = "978-3-642-21517-9",
series = "Lecture Notes in Computer Science",
publisher = "Springer",
pages = "139--154",
booktitle = "Information Security and Cryptology, Inscrypt 2010",
address = "Germany",
note = "6th China International Conference on Information Security and Cryptology, Inscrypt 2010 ; Conference date: 20-10-2010 Through 24-10-2010",
}