Functional Graph Revisited: Updates on (Second) Preimage Attacks on Hash Combiners.
Zhenzhen BaoLei WangJian GuoDawu GuPublished in: CRYPTO (2) (2017)
Keyphrases
- directed graph
- graph representation
- protein function prediction
- malicious attacks
- random walk
- countermeasures
- graph matching
- weighted graph
- graph model
- directed acyclic graph
- graph structure
- structured data
- hash functions
- graph mining
- data structure
- graph theory
- connected components
- watermarking scheme
- undirected graph
- watermarking algorithm
- graph theoretic
- traffic analysis
- security risks
- graph based algorithm
- digital plane
- dual space