On a Probabilistic Approach to the Security Analysis of Cryptographic Hash Functions.
Giuliano LaccettiGiovanni SchmidPublished in: IACR Cryptol. ePrint Arch. (2004)
Keyphrases
- hash functions
- security analysis
- encryption scheme
- stream cipher
- smart card
- similarity search
- authentication protocol
- security properties
- security requirements
- public key
- secret key
- image encryption
- standard model
- security model
- hamming distance
- encryption algorithm
- user authentication
- elliptic curve cryptography
- high security
- signature scheme
- ciphertext
- authentication scheme
- hashing methods
- information security
- databases
- binary codes
- private key
- block cipher
- data distribution
- lightweight