Highly-Effective Backdoors for Hash Functions and Beyond.
Mihir BellareDoreen RiepelLaura SheaPublished in: IACR Cryptol. ePrint Arch. (2024)
Keyphrases
- hash functions
- hidden structure
- similarity search
- locality sensitive
- order preserving
- hashing algorithm
- satisfiability problem
- hamming distance
- locality sensitive hashing
- approximate nearest neighbor search
- sat instances
- sat solvers
- data distribution
- random projections
- nearest neighbor search
- minimal perfect hash functions
- hash table
- secret key
- block cipher
- image content
- stream cipher
- training set
- search algorithm
- face recognition
- neural network