Login / Signup
Slide Attacks on a Class of Hash Functions.
Michael Gorski
Stefan Lucks
Thomas Peyrin
Published in:
IACR Cryptol. ePrint Arch. (2008)
Keyphrases
</>
hash functions
stream cipher
block cipher
similarity search
order preserving
hamming distance
locality sensitive hashing
database
neural network
machine learning
feature selection
image processing
multi dimensional