A mathematical problem for security analysis of hash functions and pseudorandom generators
Koji NuidaTakuro AbeShizuo KajiToshiaki MaenoYasuhide NumataPublished in: CoRR (2012)
Keyphrases
- security analysis
- hash functions
- pseudorandom
- secret key
- encryption scheme
- stream cipher
- encryption algorithm
- authentication scheme
- public key
- standard model
- random number
- smart card
- high security
- authentication protocol
- similarity search
- private key
- security requirements
- image encryption
- user authentication
- uniformly distributed
- signature scheme
- hamming distance
- key management
- ciphertext
- data sets
- high dimensional
- data distribution
- software architecture
- data sharing