Indifferentiability Security of the Fast Widepipe Hash: Breaking the Birthday Barrier.
Dustin MoodySouradyuti PaulDaniel Smith-TonePublished in: IACR Cryptol. ePrint Arch. (2011)
Keyphrases
- security requirements
- intrusion detection
- information security
- hash functions
- access control
- data security
- security systems
- security issues
- functional requirements
- information assurance
- security vulnerabilities
- security properties
- encryption scheme
- network security
- information systems
- real time
- cyber security
- statistical databases
- security model
- security policies
- cryptographic protocols
- security problems
- security measures
- social networks