Login / Signup
Improved Collision Attack on Hash Function MD5.
Jie Liang
Xuejia Lai
Published in:
J. Comput. Sci. Technol. (2007)
Keyphrases
</>
hash functions
block cipher
secret key
similarity search
hashing algorithm
chaotic map
locality sensitive hashing
stream cipher
integer wavelet transform
hamming distance
data sets
nearest neighbor search
provably secure
smart card
image compression
nearest neighbor
pattern recognition