Higher-Order Differential Meet-in-The-Middle Preimage Attacks on SHA-1 and BLAKE.
Thomas EspitauPierre-Alain FouquePierre KarpmanPublished in: IACR Cryptol. ePrint Arch. (2015)
Keyphrases
- higher order
- high order
- pairwise
- natural images
- chosen plaintext
- terrorist attacks
- security risks
- traffic analysis
- security protocols
- watermarking scheme
- computer security
- low order
- security threats
- lower order
- conditional random fields
- lambda calculus
- multiscale
- countermeasures
- digital watermarking
- ddos attacks
- image watermarking
- hash functions
- denial of service attacks
- malicious attacks
- digital plane