Attacks on Cryptographic Hashes in Internet Protocols.
Paul E. HoffmanBruce SchneierPublished in: RFC (2005)
Keyphrases
- security protocols
- cryptographic protocols
- security mechanisms
- security properties
- cryptographic algorithms
- smart card
- authentication protocol
- internet users
- secure communication
- countermeasures
- resource constrained
- key management
- access control
- random projections
- security requirements
- privacy preserving
- operating system
- intrusion detection
- homomorphic encryption
- security flaws
- differential power analysis