Login / Signup
Practical (Second) Preimage Attacks on the TCS_SHA-3 Family of Cryptographic Hash Functions.
Gautham Sekar
Soumyadeep Bhattacharya
Published in:
J. Inf. Process. Syst. (2016)
Keyphrases
</>
hash functions
stream cipher
block cipher
similarity search
locality sensitive
hashing algorithm
order preserving
hamming distance
locality sensitive hashing
nearest neighbor search
secret key
encryption scheme
hash table
minimal perfect hash functions
machine learning
data distribution
hyperplane
training data