Combinatorics on words in information security: Unavoidable regularities in the construction of multicollision attacks on iterated hash functions.
Juha KortelainenPublished in: WORDS (2011)
Keyphrases
- information security
- hash functions
- countermeasures
- computer security
- security risks
- block cipher
- security issues
- stream cipher
- similarity search
- information systems
- smart card
- network security
- intrusion detection
- security threats
- security requirements
- locality sensitive
- locality sensitive hashing
- security mechanisms
- information assurance
- data distribution
- smart grid
- cyber defense
- sensitive data
- hamming distance
- e government
- information security management
- data streams
- binary codes
- secret key
- critical infrastructure
- hashing methods
- knowledge discovery
- data analysis
- data sets