Security Properties of Domain Extenders for Cryptographic Hash Functions.
Elena AndreevaBart MenninkBart PreneelPublished in: J. Inf. Process. Syst. (2010)
Keyphrases
- hash functions
- security properties
- formal model
- security requirements
- security analysis
- similarity search
- security protocols
- encryption scheme
- cryptographic protocols
- hamming distance
- authentication protocol
- data distribution
- block cipher
- client server environment
- machine learning
- secret key
- formal methods
- smart card