On the complexity of the herding attack and some related attacks on hash functions.
Simon R. BlackburnDouglas R. StinsonJalaj UpadhyayPublished in: Des. Codes Cryptogr. (2012)
Keyphrases
- hash functions
- block cipher
- countermeasures
- attack detection
- malicious attacks
- differential power analysis
- similarity search
- hamming distance
- power analysis
- stream cipher
- secret key
- ddos attacks
- malicious users
- data sets
- data corruption
- hashing algorithm
- denial of service attacks
- order preserving
- s box
- feature space
- hashing methods
- cyber attacks
- dos attacks
- locality sensitive hashing
- locality sensitive
- watermarking scheme
- attack scenarios
- injection attacks
- database