Research Article

A Second Preimage Attack on the XOR Hash Combiner

Figure 1

Schematic of XOR hash combiner.