Login / Signup
A review of collisions in cryptographic hash function used in digital forensic tools.
Zulfany Erlisa Rasjid
Benfano Soewito
Gunawan Witjaksono
Edi Abdurachman
Published in:
ICCSCI (2017)
Keyphrases
</>
hash functions
digital forensics
similarity search
hashing algorithm
computer forensics
nearest neighbor search
block cipher
hash tables
forensic analysis
data distribution
hamming distance
locality sensitive hashing
encryption scheme
stream cipher
hash table
neural network
secret key
structured data
social networks