Second Preimages for Iterated Hash Functions Based on a b-Block Bypass.
Mario LambergerNorbert PramstallerVincent RijmenPublished in: IACR Cryptol. ePrint Arch. (2006)
Keyphrases
- hash functions
- similarity search
- locality sensitive
- approximate nearest neighbor search
- order preserving
- hashing algorithm
- random projections
- secret key
- locality sensitive hashing
- hamming distance
- minimal perfect hash functions
- hash table
- binary codes
- high dimensional
- block cipher
- stream cipher
- encryption scheme
- query processing
- approximate similarity search
- computational complexity