ISO IEC 10118-2-2010 pdf download Information technology — Security techniques — Hash-functions — Part 2: Hash-functions using an n-bit block cipher 6.6 Output transformation The output transformation T is simply truncation, i.e., the hash-code H is derived by taking the leftmost L H bits of the final output block H q . 7 Hash-function 2 7.1 General The hash-function specified...