Inversion Attacks on Secure Hash Functions Using satSolvers.
Debapratim DeAbishek KumarasubramanianRamarathnam VenkatesanPublished in: SAT (2007)
Keyphrases
- hash functions
- stream cipher
- block cipher
- secret key
- similarity search
- hashing algorithm
- locality sensitive
- hamming distance
- encryption scheme
- order preserving
- locality sensitive hashing
- cryptographic protocols
- authentication protocol
- secure routing
- database
- security protocols
- security mechanisms
- authentication scheme
- provably secure
- chosen plaintext
- binary codes
- countermeasures