Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses.
Vincent ChevalCas CremersAlexander DaxLucca HirschiCharlie JacommeSteve KremerPublished in: USENIX Security Symposium (2023)
Keyphrases
- hash functions
- automated discovery
- provably secure
- authentication protocol
- cryptographic protocols
- stream cipher
- block cipher
- security protocols
- hashing algorithm
- similarity search
- knowledge discovery
- secret key
- hamming distance
- encryption scheme
- nearest neighbor search
- hash table
- hash tables
- hamming space
- locality sensitive hashing
- security analysis
- data distribution
- signature scheme
- watermarking scheme
- lightweight
- hashing methods
- binary codes
- neural network