Collision Attack on 4-Branch, Type-2 GFN Based Hash Functions Using Sliced Biclique Cryptanalysis Technique.
Megha AgrawalDonghoon ChangMohona GhoshSomitra Kumar SanadhyaPublished in: Inscrypt (2014)
Keyphrases
- hash functions
- block cipher
- secret key
- locality sensitive
- hashing algorithm
- similarity search
- hamming distance
- locality sensitive hashing
- authentication protocol
- order preserving
- encryption scheme
- minimal perfect hash functions
- hash table
- s box
- data distribution
- hamming space
- data mining
- binary codes
- nearest neighbor search
- collision detection
- signature scheme
- lightweight
- database management systems
- multi dimensional
- stream cipher
- knn
- query processing
- feature vectors