New Records in Collision Attacks on SHA-2.
Yingxin LiFukang LiuGaoli WangPublished in: EUROCRYPT (1) (2024)
Keyphrases
- countermeasures
- malicious attacks
- collision detection
- databases
- database
- traffic analysis
- watermarking scheme
- hash functions
- terrorist attacks
- collision avoidance
- malicious users
- computer security
- attribute values
- detecting malicious
- watermarking method
- data publishing
- chosen plaintext
- block cipher
- security threats
- security problems
- cyber attacks
- ddos attacks
- security mechanisms
- record linkage
- watermarking algorithm
- neural network