Triangulating Rebound Attack on AES-like Hashing.
Xiaoyang DongJian GuoShun LiPhuong PhamPublished in: CRYPTO (1) (2022)
Keyphrases
- secret key
- hash functions
- block cipher
- encryption algorithm
- fault model
- hashing algorithm
- locality sensitive
- approximate nearest neighbor search
- countermeasures
- data structure
- order preserving
- random projections
- locality sensitive hashing
- pseudorandom
- smart card
- similarity search
- hashing methods
- file organization
- nearest neighbor search
- authentication scheme
- hash tables
- cryptographic algorithms
- private key
- s box
- detection mechanism
- key distribution
- power analysis
- information security
- public key
- advanced encryption standard
- neural network