New Techniques for Cryptanalysis of Hash Functions and Improved Attacks on Snefru.
Eli BihamPublished in: FSE (2008)
Keyphrases
- hash functions
- block cipher
- stream cipher
- similarity search
- locality sensitive
- locality sensitive hashing
- hashing algorithm
- secret key
- order preserving
- hamming distance
- hash table
- s box
- signature scheme
- data distribution
- nearest neighbor search
- encryption scheme
- high dimensional
- databases
- minimal perfect hash functions
- hashing methods
- security mechanisms
- multi dimensional
- pattern recognition
- training data
- machine learning
- neural network