Malicious Hashing: Eve's Variant of SHA-1.
Ange AlbertiniJean-Philippe AumassonMaria EichlsederFlorian MendelMartin SchläfferPublished in: Selected Areas in Cryptography (2014)
Keyphrases
- hash functions
- hashing algorithm
- similarity search
- locality sensitive hashing
- locality sensitive
- hash tables
- order preserving
- random projections
- hamming distance
- nearest neighbor search
- hashing methods
- data structure
- approximate nearest neighbor search
- databases
- network security
- file organization
- malicious attacks
- gray code
- information systems
- real world