Modifications of SHA-0 to Prevent Attacks.
Roshni ChatterjeeMoiz A. SaifeeDipanwita Roy ChowdhuryPublished in: ICISS (2005)
Keyphrases
- countermeasures
- sql injection
- database
- malicious users
- malicious attacks
- hash functions
- traffic analysis
- chosen plaintext
- watermarking scheme
- data sets
- security mechanisms
- web applications
- ddos attacks
- dos attacks
- cryptographic protocols
- security problems
- security threats
- security risks
- denial of service attacks
- lightweight
- attack detection
- multiresolution
- differential power analysis
- neural network