Login / Signup
Collision Attack for the Hash Function Extended MD4.
Gaoli Wang
Published in:
ICICS (2011)
Keyphrases
</>
hash functions
block cipher
secret key
similarity search
chaotic map
locality sensitive hashing
hash tables
hashing algorithm
neural network
provably secure
data mining
hash table
hashing methods
stream cipher
integer wavelet transform
nearest neighbor search