Security Analysis of the Mode of JH Hash Function.
Rishiraj BhattacharyyaAvradip MandalMridul NandiPublished in: FSE (2010)
Keyphrases
- security analysis
- hash functions
- encryption scheme
- stream cipher
- security model
- public key
- similarity search
- standard model
- provably secure
- security requirements
- high security
- smart card
- image encryption
- security properties
- secret key
- authentication protocol
- hash table
- signature scheme
- user authentication
- diffie hellman
- feature selection
- query processing
- databases