New Records in Collision Attacks on SHA-2.
Yingxin LiFukang LiuGaoli WangPublished in: IACR Cryptol. ePrint Arch. (2024)
Keyphrases
- collision detection
- databases
- countermeasures
- database
- collision avoidance
- malicious users
- attack detection
- malicious attacks
- denial of service attacks
- statistical databases
- data records
- record linkage
- watermarking algorithm
- watermarking scheme
- attribute values
- chosen plaintext
- java card
- digital image watermarking
- data corruption
- cryptographic protocols
- cyber attacks
- computer security
- security mechanisms
- wireless sensor networks
- query processing
- cooperative
- search engine
- data mining
- data sets