Higher-Order Differential Meet-in-the-middle Preimage Attacks on SHA-1 and BLAKE.
Thomas EspitauPierre-Alain FouquePierre KarpmanPublished in: CRYPTO (1) (2015)
Keyphrases
- higher order
- high order
- markov random field
- natural images
- security threats
- countermeasures
- pairwise
- low order
- hyperplane
- watermarking scheme
- malicious attacks
- security mechanisms
- conditional random fields
- image watermarking
- traffic analysis
- feature space
- terrorist attacks
- digital plane
- data publishing
- malicious users
- cryptographic protocols
- cyber attacks
- dos attacks
- security protocols
- belief propagation