Non-Linear Reduced Round Attacks Against SHA-2 Hash family.
Somitra Kumar SanadhyaPalash SarkarPublished in: IACR Cryptol. ePrint Arch. (2008)
Keyphrases
- hash functions
- block cipher
- hashing algorithm
- similarity search
- hash table
- hamming distance
- special case
- secret key
- data distribution
- malicious attacks
- watermarking scheme
- security protocols
- locality sensitive hashing
- hashing methods
- computer systems
- neural network
- countermeasures
- signature scheme
- data structure
- web services
- data mining