The Theory and Practice of Magic Hash Based Attacks on Lightweight Cryptographic Hash Functions in Complex IoT Environments.
Norbert TihanyiBertalan BorsosPublished in: SpaCCS Workshops (2020)
Keyphrases
- hash functions
- block cipher
- lightweight
- stream cipher
- similarity search
- locality sensitive
- hamming distance
- locality sensitive hashing
- dos attacks
- authentication protocol
- order preserving
- data distribution
- secret key
- management system
- development environments
- s box
- nearest neighbor search
- multi dimensional
- principal component analysis
- communication infrastructure
- data structure
- hamming space