Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses.
Vincent ChevalCas CremersAlexander DaxLucca HirschiCharlie JacommeSteve KremerPublished in: IACR Cryptol. ePrint Arch. (2022)
Keyphrases
- hash functions
- automated discovery
- provably secure
- authentication protocol
- stream cipher
- cryptographic protocols
- block cipher
- security protocols
- hashing algorithm
- similarity search
- knowledge discovery
- hamming distance
- secret key
- hash table
- locality sensitive hashing
- data distribution
- hash tables
- ddos attacks
- encryption scheme
- information retrieval
- hashing methods
- hamming space
- data sets
- application layer
- nearest neighbor search
- signature scheme
- knn
- high dimensional
- neural network