Attacks on JH, Grstl and SMASH Hash Functions.
Yiyuan LuoXuejia LaiPublished in: IACR Cryptol. ePrint Arch. (2013)
Keyphrases
- hash functions
- stream cipher
- block cipher
- similarity search
- hierarchical architecture
- order preserving
- locality sensitive
- hashing algorithm
- locality sensitive hashing
- nearest neighbor search
- secret key
- hamming distance
- watermarking scheme
- security mechanisms
- hash table
- data distribution
- rapid prototyping
- hamming space
- binary codes
- machine learning
- keypoints
- image processing