Sign in

The Sponge Structure Modulation Application to Overcome the Security Breaches for the MD5 and SHA-1 Hash Functions.

Zeyad A. Al-OdatSamee Khan
Published in: COMPSAC (1) (2019)
Keyphrases
  • hash functions
  • security breaches
  • similarity search
  • order preserving
  • random projections
  • feature space
  • low dimensional
  • network security
  • nearest neighbor search