VLSI Implementations of the Cryptographic Hash Functions MD6 and ïrRUPT.
Luca HenzenFlavio CarbognaniJean-Philippe AumassonSean O'NeilWolfgang FichtnerPublished in: ISCAS (2009)
Keyphrases
- hash functions
- similarity search
- locality sensitive
- hashing algorithm
- locality sensitive hashing
- order preserving
- signal processing
- efficient implementation
- hamming distance
- secret key
- single chip
- hash table
- encryption scheme
- principal component analysis
- hamming space
- minimal perfect hash functions
- neural network
- stream cipher
- block cipher
- data mining