Login / Signup
Some Attacks Against a Double Length Hash Proposal.
Lars R. Knudsen
Frédéric Muller
Published in:
ASIACRYPT (2005)
Keyphrases
</>
countermeasures
hash functions
watermarking scheme
total length
malicious attacks
traffic analysis
attack detection
fixed length
computer security
cryptographic protocols
malicious users
denial of service attacks
b tree
block cipher
java card
digital images
maximum number