Cryptanalysis of an iterated halving-based hash function: CRUSH.
Nasour BagheriMatt HenricksenLars R. KnudsenMajid NaderiB. SadeghyianPublished in: IET Inf. Secur. (2009)
Keyphrases
- hash functions
- similarity search
- random sampling
- chaotic map
- hashing algorithm
- block cipher
- locality sensitive hashing
- secret key
- hamming distance
- provably secure
- hash tables
- stream cipher
- hash table
- data distribution
- neural network
- hamming space
- signature scheme
- image retrieval
- high dimensional
- training data
- feature selection
- machine learning