Research Article

A Second Preimage Attack on the XOR Hash Combiner

Figure 3

Construction of the inverse-diamond structure.