Login / Signup

Reliable hardware architectures for efficient secure hash functions ECHO and fugue.

Mehran Mozaffari KermaniReza AzarderakhshSiavash Bayat Sarmadi
Published in: CF (2018)
Keyphrases
  • hash functions
  • provably secure
  • hardware architectures
  • hashing algorithm
  • stream cipher
  • block cipher
  • databases
  • neural network
  • similarity search
  • locality sensitive
  • data mining
  • hamming space