An Update on the Side Channel Cryptanalysis of MACs Based on Cryptographic Hash Functions.
Praveen GauravaramKatsuyuki OkeyaPublished in: INDOCRYPT (2007)
Keyphrases
- hash functions
- secret key
- similarity search
- block cipher
- locality sensitive
- locality sensitive hashing
- hashing algorithm
- data distribution
- order preserving
- hamming distance
- encryption scheme
- countermeasures
- power analysis
- hash table
- nearest neighbor search
- stream cipher
- pseudorandom
- hashing methods
- data points
- binary codes
- feature selection
- ciphertext
- smart card
- minimal perfect hash functions