Login / Signup
Challenging the increased resistance of regular hash functions against birthday attacks.
Nicky Mouha
Gautham Sekar
Bart Preneel
Published in:
J. Math. Cryptol. (2012)
Keyphrases
</>
hash functions
block cipher
stream cipher
locality sensitive
order preserving
locality sensitive hashing
similarity search
data distribution
neural network
hashing algorithm
approximate similarity search
data sets
hamming distance
security protocols
secret key
countermeasures
watermarking scheme
image processing