Login / Signup
The Sponge Structure Modulation Application to Overcome the Security Breaches for the MD5 and SHA-1 Hash Functions.
Zeyad A. Al-Odat
Samee Khan
Published in:
COMPSAC (1) (2019)
Keyphrases
</>
hash functions
security breaches
similarity search
order preserving
random projections
feature space
low dimensional
network security
nearest neighbor search