Collision Attack on 4-branch, Type-2 GFN based Hash Functions using Sliced Biclique Cryptanalysis Technique.
Megha AgrawalDonghoon ChangMohona GhoshSomitra Kumar SanadhyaPublished in: IACR Cryptol. ePrint Arch. (2015)
Keyphrases
- hash functions
- block cipher
- secret key
- similarity search
- locality sensitive
- hashing algorithm
- authentication protocol
- hamming distance
- order preserving
- locality sensitive hashing
- data distribution
- s box
- nearest neighbor search
- hash table
- stream cipher
- encryption scheme
- minimal perfect hash functions
- lightweight
- decision trees
- binary codes
- data sets
- signature scheme
- neural network