A Configurable Implementation of the SHA-256 Hash Function.
Raffaele MartinoAlessandro CilardoPublished in: 3PGCIC (2019)
Keyphrases
- hash functions
- similarity search
- hamming distance
- chaotic map
- locality sensitive hashing
- data distribution
- hashing algorithm
- hash table
- integer wavelet transform
- secret key
- pattern recognition
- hash tables
- stream cipher
- index structure
- high dimensional data
- database management systems
- high dimensional
- feature space
- provably secure
- feature extraction
- database systems