Malicious Hashing: Eve's Variant of SHA-1.
Ange AlbertiniJean-Philippe AumassonMaria EichlsederFlorian MendelMartin SchläfferPublished in: IACR Cryptol. ePrint Arch. (2014)
Keyphrases
- hash functions
- hashing algorithm
- order preserving
- locality sensitive
- nearest neighbor search
- random projections
- hash table
- linear hashing
- hamming space
- approximate nearest neighbor search
- similarity search
- malicious behavior
- databases
- detect malicious
- database
- locality sensitive hashing
- binary codes
- file organization
- malicious attacks
- hash tables
- gray code
- computer systems
- information systems
- machine learning