Login / Signup
Some thoughts on Collision Attacks in the Hash Functions MD5, SHA-0 and SHA-1.
Praveen Gauravaram
William Millan
Juanma González Nieto
Published in:
IACR Cryptol. ePrint Arch. (2005)
Keyphrases
</>
hash functions
stream cipher
block cipher
similarity search
locality sensitive
order preserving
hashing algorithm
hamming distance
locality sensitive hashing
data distribution
collision detection
hash table
signature scheme
secret key
binary codes
neural network
support vector
decision trees