Login / Signup
Cryptanalysis of the Alleged SecurID Hash Function.
Alex Biryukov
Joseph Lano
Bart Preneel
Published in:
Selected Areas in Cryptography (2003)
Keyphrases
</>
hash functions
similarity search
chaotic map
hashing algorithm
block cipher
secret key
locality sensitive hashing
hamming distance
hash table
hashing methods
provably secure
nearest neighbor search
signature scheme
hash tables
data distribution
databases
stream cipher
integer wavelet transform
feature selection