Diving Deep into the Preimage Security of AES-like Hashing.
Shiyao ChenJian GuoEik ListDanping ShiTianyu ZhangPublished in: IACR Cryptol. ePrint Arch. (2024)
Keyphrases
- encryption algorithms
- advanced encryption standard
- cryptographic algorithms
- encryption algorithm
- access control
- security policies
- encryption decryption
- intrusion detection
- information security
- file organization
- data structure
- statistical databases
- security protocols
- security systems
- hash functions
- order preserving
- block cipher
- computer security
- security mechanisms
- secret key
- security requirements
- security issues
- authentication protocol
- data security
- hyperplane
- private key
- cyber security
- network security