Login / Signup
Boomerang Attacks on Hash Function Using Auxiliary Differentials.
Gaëtan Leurent
Arnab Roy
Published in:
CT-RSA (2012)
Keyphrases
</>
hash functions
stream cipher
block cipher
similarity search
hashing algorithm
hamming distance
hash table
hashing methods
secret key
security protocols
hash tables
hamming space
integer wavelet transform
binary codes
database
nearest neighbor search
image quality
wavelet transform
feature selection
databases