Exploiting Vulnerabilities in Cryptographic Hash Functions Based on Reconfigurable Hardware.
Alessandro CilardoNicola MazzoccaPublished in: IEEE Trans. Inf. Forensics Secur. (2013)
Keyphrases
- hash functions
- reconfigurable hardware
- low cost
- similarity search
- information security
- hardware software
- fine grain
- evolvable hardware
- data distribution
- hamming distance
- hardware implementation
- field programmable gate array
- stream cipher
- block cipher
- hashing methods
- image processing
- neural network
- encryption scheme
- secret key
- hardware and software
- data streams
- similarity measure
- databases
- real time