Indifferentiability security of the fast wide pipe hash: Breaking the birthday barrier.
Dustin MoodySouradyuti PaulDaniel Smith-TonePublished in: J. Math. Cryptol. (2016)
Keyphrases
- security issues
- access control
- security requirements
- information security
- hash functions
- wide range
- intrusion detection
- security policies
- information assurance
- computer security
- network management
- network security
- data structure
- functional requirements
- security mechanisms
- security threats
- security management
- security measures
- statistical databases
- key management
- anomaly detection
- security systems
- security properties
- security problems