DocumentCode :
3775236
Title :
Double-A -- A Salsa20 Like: The Security
Author :
Abdullah Al-Saleh;Mohammed Al-Ahmmad;Abdullah Issa;Adel Al-Foudery
Author_Institution :
Comput. Sci. Dept., Coll. of Basic Educ. Public Authority for Appl. Educ. &
fYear :
2015
Firstpage :
24
Lastpage :
29
Abstract :
A good hash function should work like a random oracle or a random sponge. It should not have weakness points in neither the construction nor its cipher. DOUBLE-A (The Security) paper is the complimentary of DOUBLE-A (The Design). It explains the idea of each attack on the cipher and construction of it and how the attacks fit hash function. This paper analyzes the security of the DOUBLE-A hash function and shows the resistance of it against basic security criteria and most known distinguishers.
Keywords :
"Ciphers","Resistance","Complexity theory","Education","Computer science"
Publisher :
ieee
Conference_Titel :
Advanced Computer Science Applications and Technologies (ACSAT), 2015 4th International Conference on
Print_ISBN :
978-1-5090-0423-2
Type :
conf
DOI :
10.1109/ACSAT.2015.14
Filename :
7478713
Link To Document :
بازگشت