The security of cryptographic hashes.
Chad TeatSvetlana PeltsvergerPublished in: ACM Southeast Regional Conference (2011)
Keyphrases
- security protocols
- key management
- security properties
- fuzzy vault
- smart card
- encryption scheme
- information security
- cryptographic protocols
- cryptographic algorithms
- encryption decryption
- high assurance
- network security
- elliptic curve cryptography
- security requirements
- encryption key
- intrusion detection
- access control
- security mechanisms
- ad hoc networks
- stream cipher
- public key cryptography
- packet filtering
- public key encryption
- random number generator
- high security
- security services
- locality sensitive hashing
- random projections
- secure communication
- authentication scheme
- security systems
- digital signature
- security analysis
- statistical databases
- hash functions
- information systems