Security Analysis of the Whirlpool Hash Function in the Cloud of Things.
Wei LiZhiyong GaoDawu GuChenyu GeLinfeng LiaoZhihong ZhouYa LiuZhiqiang LiuPublished in: KSII Trans. Internet Inf. Syst. (2017)
Keyphrases
- security analysis
- hash functions
- encryption scheme
- customer service
- stream cipher
- public key
- similarity search
- cloud computing
- smart card
- standard model
- signature scheme
- security requirements
- authentication protocol
- security model
- secret key
- high security
- security properties
- customer satisfaction
- provably secure
- image encryption
- data distribution
- user authentication
- authentication scheme
- encryption algorithm
- high dimensional
- information systems