Superposition Meet-in-the-Middle Attacks: Updates on Fundamental Security of AES-like Hashing.
Zhenzhen BaoJian GuoDanping ShiYi TuPublished in: CRYPTO (1) (2022)
Keyphrases
- advanced encryption standard
- cryptographic algorithms
- block cipher
- hash functions
- security threats
- security mechanisms
- stream cipher
- security protocols
- secret key
- encryption algorithms
- security problems
- computer security
- security vulnerabilities
- java card
- denial of service attacks
- fault injection
- security measures
- security issues
- cyber attacks
- security breaches
- chosen plaintext
- s box
- biometric data
- security risks
- elliptic curve cryptography
- information security
- countermeasures
- fault model
- cryptographic protocols
- malicious attacks
- malicious users
- security systems
- secure routing
- security flaws
- access control
- intrusion detection
- encryption decryption
- biometric template
- data structure
- malicious nodes
- network security
- data security
- encryption algorithm
- smart card
- similarity search
- attack scenarios
- buffer overflow
- information leakage
- resource constrained