Triangulating Rebound Attack on AES-like Hashing.
Xiaoyang DongJian GuoShun LiPhuong PhamPublished in: IACR Cryptol. ePrint Arch. (2022)
Keyphrases
- secret key
- hash functions
- block cipher
- encryption algorithm
- fault model
- hashing algorithm
- similarity search
- data structure
- order preserving
- random projections
- nearest neighbor search
- locality sensitive hashing
- approximate nearest neighbor search
- pseudorandom
- locality sensitive
- smart card
- linear hashing
- malicious attacks
- countermeasures
- file organization
- authentication scheme
- denial of service attacks
- hash tables
- s box
- hamming distance
- cryptographic algorithms
- lightweight
- ciphertext
- binary codes
- encryption algorithms
- encryption decryption
- advanced encryption standard
- data sets