Journals
Publish with us
Publishing partnerships
About us
Blog
IET Information Security
Journal overview
For authors
For reviewers
For editors
Table of Contents
Special Issues
IET Information Security
/
2024
/
Article
/
Fig 1
/
Research Article
A Second Preimage Attack on the XOR Hash Combiner
Figure 1
Schematic of XOR hash combiner.