Second Preimages for Iterated Hash Functions and Their Implications on MACs Publication Type: Report Authors: Pramstaller, N.; Lamberger M.; Rijmen V. Source: 12th Australasian Conference on Information Security and Privacy, ACIP 2007, Number LNCS, vol. 4586, p.68-81 (2007)