The second role of hash functions is to prevent this attacks or attacks which is similar to this kind of attacks. It is not surely knew which of the properties of the hash function are adequate to satisfy this part. The Cramer-Shoup signature scheme is the unusual example of a signature scheme that uses a hash function only for domain extension that is it does not require a hash function for signing short messages. An attacker prepares two documents M1 and M2, hashes of these documents are identical, and then a hash-and-sign signature on M1 is also a valid signature on
The second role of hash functions is to prevent this attacks or attacks which is similar to this kind of attacks. It is not surely knew which of the properties of the hash function are adequate to satisfy this part. The Cramer-Shoup signature scheme is the unusual example of a signature scheme that uses a hash function only for domain extension that is it does not require a hash function for signing short messages. An attacker prepares two documents M1 and M2, hashes of these documents are identical, and then a hash-and-sign signature on M1 is also a valid signature on