Non-linear Reduced Round Attacks against SHA-2 Hash Family.
Somitra Kumar SanadhyaPalash SarkarPublished in: ACISP (2008)
Keyphrases
- hash functions
- block cipher
- similarity search
- hashing algorithm
- hash table
- hamming distance
- locality sensitive hashing
- data structure
- computer security
- secret key
- countermeasures
- b tree
- special case
- web services
- data distribution
- database systems
- dimensionality reduction
- multiresolution
- similarity measure
- security threats
- website
- traffic analysis
- malicious attacks
- neural network