On the (In)Security of IDEA in Various Hashing Modes.
Lei WeiThomas PeyrinPrzemyslaw SokolowskiSan LingJosef PieprzykHuaxiong WangPublished in: IACR Cryptol. ePrint Arch. (2012)
Keyphrases
- information security
- information assurance
- security requirements
- network security
- access control
- security properties
- security issues
- data structure
- intrusion detection
- security policies
- security systems
- network management
- security mechanisms
- computer security
- security problems
- linear hashing
- rfid tags
- authentication protocol
- security protocols
- security analysis
- neural network
- hamming distance
- computer networks
- operating system
- knn
- information systems