Finding Bugs in Cryptographic Hash Function Implementations.
Nicky MouhaMohammad S. RaunakD. Richard KuhnRaghu KackerPublished in: IEEE Trans. Reliab. (2018)
Keyphrases
- hash functions
- similarity search
- chaotic map
- hashing algorithm
- hamming distance
- locality sensitive hashing
- hash tables
- data distribution
- nearest neighbor search
- encryption scheme
- source code
- efficient implementation
- binary codes
- signature scheme
- integer wavelet transform
- stream cipher
- data sets
- nearest neighbor
- similarity measure