On the hardware implementations of the SHA-2 (256, 384, 512) hash functions.
Nicolas SklavosOdysseas G. KoufopavlouPublished in: ISCAS (5) (2003)
Keyphrases
- hash functions
- locality sensitive
- hashing algorithm
- similarity search
- hamming distance
- random projections
- order preserving
- approximate nearest neighbor search
- locality sensitive hashing
- binary codes
- secret key
- encryption scheme
- data distribution
- similarity measure
- block cipher
- nearest neighbor search
- hash table
- hashing methods
- stream cipher
- high dimensional