This paper describes an attack of the iterated use of hashing functions used as key stretching algorithms where the state of a hash can be transferred to the next hash function.
52f96766730e53dd9b718a0a0d0d999d36d38002c0a17023db1db12a5d4196c7
© 2022 Packet Storm. All rights reserved.