Login / Signup
Preimage and pseudo-collision attacks on step-reduced SM3 hash function.
Gaoli Wang
Yanzhao Shen
Published in:
Inf. Process. Lett. (2013)
Keyphrases
</>
hash functions
stream cipher
block cipher
similarity search
hashing algorithm
locality sensitive hashing
secret key
hash tables
chaotic map
hash table
data distribution
watermarking scheme
hamming distance
databases
high dimensional
machine learning
pattern matching
hyperplane
neural network
data sets
database