Second Preimage Attacks on Dithered Hash Functions.
Charles BouillaguetPierre-Alain FouqueAdi ShamirSébastien ZimmerPublished in: IACR Cryptol. ePrint Arch. (2007)
Keyphrases
- hash functions
- stream cipher
- block cipher
- similarity search
- hashing algorithm
- locality sensitive
- order preserving
- hamming distance
- locality sensitive hashing
- secret key
- data distribution
- hash table
- minimal perfect hash functions
- nearest neighbor search
- watermarking scheme
- hyperplane
- data sets
- security mechanisms
- hashing methods
- pattern recognition
- image processing
- binary codes
- pattern matching
- digital plane
- machine learning