Multicollision attacks and generalized iterated hash functions.
Juha KortelainenKimmo HalunenTuomas KortelainenPublished in: J. Math. Cryptol. (2010)
Keyphrases
- hash functions
- block cipher
- stream cipher
- similarity search
- locality sensitive
- order preserving
- locality sensitive hashing
- hashing algorithm
- hamming distance
- countermeasures
- neural network
- data distribution
- secret key
- data sets
- hash table
- security protocols
- nearest neighbor search
- watermarking scheme
- pattern matching
- nearest neighbor
- image processing
- data mining
- databases
- database
- hamming space
- minimal perfect hash functions