Security Analysis of SHA-256 and Sisters.
Henri GilbertHelena HandschuhPublished in: Selected Areas in Cryptography (2003)
Keyphrases
- security analysis
- smart card
- hash functions
- public key
- high security
- security requirements
- encryption scheme
- image encryption
- security model
- security properties
- authentication protocol
- video sequences
- private key
- user authentication
- encryption algorithm
- multiresolution
- similarity measure
- cost effective
- fine grained
- data integration
- peer to peer
- software development
- authentication scheme
- mutual authentication