New Second-Preimage Attacks on Hash Functions.
Elena AndreevaCharles BouillaguetOrr DunkelmanPierre-Alain FouqueJonathan J. HochJohn KelseyAdi ShamirSébastien ZimmerPublished in: J. Cryptol. (2016)
Keyphrases
- hash functions
- stream cipher
- block cipher
- locality sensitive
- similarity search
- hashing algorithm
- order preserving
- locality sensitive hashing
- data distribution
- secret key
- hash table
- hamming space
- hyperplane
- security mechanisms
- digital plane
- hamming distance
- minimal perfect hash functions
- encryption scheme
- dual space
- hashing methods
- data sets
- nearest neighbor search
- lightweight
- pattern recognition
- similarity measure
- image processing
- neural network
- databases