Login / Signup
The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function.
Jian Guo
Jérémy Jean
Gaëtan Leurent
Thomas Peyrin
Lei Wang
Published in:
Selected Areas in Cryptography (2014)
Keyphrases
</>
hash functions
block cipher
secret key
similarity search
chaotic map
locality sensitive hashing
hamming distance
hashing algorithm
hash table
stream cipher
binary codes
data distribution
data sets
ciphertext
database
provably secure
lightweight