Investigating the Avalanche Effect of Various Cryptographically Secure Hash Functions and Hash-Based Applications.
Darshana UpadhyayNupur GaikwadMarzia ZamanSrinivas SampalliPublished in: IEEE Access (2022)
Keyphrases
- hash functions
- stream cipher
- block cipher
- encryption scheme
- authentication protocol
- similarity search
- locality sensitive
- locality sensitive hashing
- hashing algorithm
- order preserving
- hamming distance
- nearest neighbor search
- data sets
- data distribution
- secret key
- hash table
- hamming space
- security analysis
- binary codes
- metric space
- high dimensional data
- lightweight