Evaluate the security margins of SHA-512, SHA-256 and DHA-256 against the boomerang attack.
Hongbo YuYonglin HaoDongxia BaiPublished in: Sci. China Inf. Sci. (2016)
Keyphrases
- hash functions
- security measures
- key exchange protocol
- security vulnerabilities
- block cipher
- authentication protocol
- denial of service attacks
- fault injection
- dos attacks
- cyber attacks
- access control
- malicious users
- network security
- intrusion detection
- authentication mechanism
- encryption algorithm
- security management
- security issues
- attack scenarios
- forensic analysis
- malicious attacks
- training set
- key agreement
- authentication scheme
- security properties
- statistical databases
- security policies