Long-lived digital integrity using short-lived hash functions

  • Stuart Haber Trusted
  • Published 2006


New collision-finding attacks on widely used cryptographic hash functions raise questions about systems that depend on certain properties of these functions for their security. Even after new and presumably better hash functions are deployed, users may have digital signatures and digital time-stamp certificates that were computed with recently deprecated… (More)


  • Presentations referencing similar topics