Rebound Attacks on the Reduced Grøstl Hash Function.
Florian MendelChristian RechbergerMartin SchläfferSøren S. ThomsenPublished in: CT-RSA (2010)
Keyphrases
- hash functions
- stream cipher
- block cipher
- hashing algorithm
- similarity search
- chaotic map
- secret key
- neural network
- data distribution
- integer wavelet transform
- hash tables
- hash table
- hamming space
- databases
- locality sensitive hashing
- security protocols
- binary codes
- hamming distance
- pattern recognition
- database systems