Login / Signup
Attacks on a double length blockcipher-based hash proposal.
Yiyuan Luo
Xuejia Lai
Tiejun Jia
Published in:
Cryptogr. Commun. (2015)
Keyphrases
</>
b tree
data structure
cooperative
countermeasures
fixed length
security mechanisms
malicious attacks
total length
hash table
database
watermarking scheme
security protocols
watermarking algorithm
traffic analysis
denial of service attacks
hash functions
terrorist attacks
attack detection
chosen plaintext