Bad directions in cryptographic hash functions.
Daniel J. BernsteinAndreas HülsingTanja LangeRuben NiederhagenPublished in: IACR Cryptol. ePrint Arch. (2015)
Keyphrases
- hash functions
- similarity search
- random projections
- hashing algorithm
- order preserving
- approximate nearest neighbor search
- locality sensitive
- locality sensitive hashing
- block cipher
- data structure
- data distribution
- hamming distance
- hash table
- secret key
- query processing
- similarity measure
- feature extraction
- encryption scheme
- machine learning
- stream cipher
- databases