New Attacks on the Concatenation and XOR Hash Combiners.
Itai DinurPublished in: IACR Cryptol. ePrint Arch. (2016)
Keyphrases
- countermeasures
- hash functions
- malicious attacks
- data structure
- watermarking scheme
- regular expressions
- attack detection
- computer security
- security mechanisms
- b tree
- terrorist attacks
- traffic analysis
- cryptographic protocols
- high dimensional
- security protocols
- image watermarking
- hash table
- nearest neighbor
- data publishing
- information systems
- lightweight
- pattern matching