International Association for Cryptologic Research (IACR)
Abstract
People had developed some attack methods to attack hash function. These methods need to choose some differential pattern [Dau05]. We present a way to restrict the collisions that hold the differential pattern . At the same time, to build a hash function that meet the different needs, we propose a construction