Sign in

A second preimage attack on zipper hash.

Shiwei ChenChenhui Jin
Published in: Secur. Commun. Networks (2015)
Keyphrases
  • hash functions
  • dual space
  • countermeasures
  • secret key
  • hyperplane
  • databases
  • b tree
  • denial of service attacks
  • feature selection
  • block cipher
  • malicious users
  • key exchange protocol