A Mathematical Problem for Security Analysis of Hash Functions and Pseudorandom Generators.
Koji NuidaTakuro AbeShizuo KajiToshiaki MaenoYasuhide NumataPublished in: IWSEC (2011)
Keyphrases
- security analysis
- hash functions
- pseudorandom
- secret key
- stream cipher
- encryption scheme
- encryption algorithm
- public key
- authentication scheme
- high security
- random number
- smart card
- authentication protocol
- security requirements
- similarity search
- signature scheme
- standard model
- key management
- ciphertext
- user authentication
- private key
- image encryption
- hamming distance
- databases
- data distribution
- hashing methods
- uniformly distributed
- data sets