Meet-in-the-Middle (Second) Preimage Attacks on Two Double-Branch Hash Functions RIPEMD and RIPEMD-128.
Lei WangYu SasakiWataru KomatsubaraKazuo SakiyamaKazuo OhtaPublished in: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. (2012)
Keyphrases
- hash functions
- stream cipher
- block cipher
- similarity search
- hashing algorithm
- locality sensitive
- order preserving
- hash table
- secret key
- watermarking scheme
- data distribution
- hamming distance
- nearest neighbor search
- hyperplane
- hashing methods
- minimal perfect hash functions
- dual space
- neural network
- locality sensitive hashing
- binary codes
- data analysis
- similarity measure
- decision trees
- machine learning