Research Article

A Second Preimage Attack on the XOR Hash Combiner

Figure 5

Scheme of our second preimage attack.