Finding Bugs in Cryptographic Hash Function Implementations.
Nicky MouhaMohammad S. RaunakD. Richard KuhnRaghu KackerPublished in: IACR Cryptol. ePrint Arch. (2017)
Keyphrases
- hash functions
- similarity search
- hashing algorithm
- provably secure
- locality sensitive hashing
- chaotic map
- block cipher
- hamming distance
- feature space
- stream cipher
- efficient implementation
- data distribution
- neural network
- hash table
- query processing
- database
- nearest neighbor search
- binary codes
- feature selection
- image quality
- multiresolution
- data streams