On the Complexity of the Herding Attack and Some Related Attacks on Hash Functions.
Simon R. BlackburnDouglas R. StinsonJalaj UpadhyayPublished in: IACR Cryptol. ePrint Arch. (2010)
Keyphrases
- block cipher
- hash functions
- countermeasures
- stream cipher
- similarity search
- secret key
- malicious attacks
- malicious users
- attack detection
- power analysis
- lightweight
- hashing algorithm
- dos attacks
- denial of service attacks
- differential power analysis
- order preserving
- security risks
- ddos attacks
- authentication protocol
- cyber attacks
- security mechanisms
- encryption scheme
- fault injection
- data corruption
- attack scenarios
- data distribution
- detecting malicious
- approximate similarity search
- feature extraction