A Security Analysis of Double-Block-Length Hash Functions with the Rate 1.
Shoichi HirosePublished in: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. (2006)
Keyphrases
- security analysis
- hash functions
- encryption scheme
- stream cipher
- authentication protocol
- similarity search
- public key
- high security
- security requirements
- standard model
- smart card
- secret key
- authentication scheme
- signature scheme
- data distribution
- image encryption
- information systems
- hamming space
- ciphertext
- dimensionality reduction