Herding Hash Functions and the Nostradamus Attack.
John KelseyTadayoshi KohnoPublished in: EUROCRYPT (2006)
Keyphrases
- hash functions
- block cipher
- secret key
- authentication protocol
- similarity search
- locality sensitive
- hashing algorithm
- approximate nearest neighbor search
- stream cipher
- order preserving
- hamming distance
- hash table
- data distribution
- machine learning
- locality sensitive hashing
- image processing
- hashing methods
- nearest neighbor search
- support vector