Meet-in-the-Middle Attacks on SHA-3 Candidates.
Dmitry KhovratovichIvica NikolicRalf-Philipp WeinmannPublished in: FSE (2009)
Keyphrases
- countermeasures
- watermarking scheme
- terrorist attacks
- malicious attacks
- security protocols
- data sets
- smart card
- security risks
- computer security
- traffic analysis
- candidate set
- java card
- chosen plaintext
- denial of service attacks
- security threats
- image watermarking
- security mechanisms
- hash functions
- case study
- website
- data mining