A Mathematical Problem for Security Analysis of Hash Functions and Pseudorandom Generators.
Koji NuidaTakuro AbeShizuo KajiToshiaki MaenoYasuhide NumataPublished in: Int. J. Found. Comput. Sci. (2015)
Keyphrases
- security analysis
- hash functions
- pseudorandom
- secret key
- encryption scheme
- stream cipher
- encryption algorithm
- public key
- authentication scheme
- high security
- authentication protocol
- smart card
- random number
- standard model
- similarity search
- private key
- security requirements
- ciphertext
- hamming distance
- signature scheme
- uniformly distributed
- image encryption
- data structure
- anomaly detection
- data distribution
- user authentication
- databases