Login / Signup
Improved Collision Attack on Hash Function MD5.
Jie Liang
Xuejia Lai
Published in:
IACR Cryptol. ePrint Arch. (2005)
Keyphrases
</>
hash functions
secret key
block cipher
similarity search
chaotic map
hash tables
hashing algorithm
locality sensitive hashing
ciphertext
stream cipher
data sets
pattern recognition
input image
nearest neighbor search
hamming space