Login / Signup
Methods of generic attacks infeasibility increasing for hash functions.
Volodymyr Luzhetsky
Yurii Baryshev
Published in:
IDAACS (2013)
Keyphrases
</>
hash functions
data sets
image processing
decision trees
feature vectors
approximate nearest neighbor search