Verification of Implementations of Cryptographic Hash Functions.
Dexi WangYu JiangHoubing SongFei HeMing GuJiaguang SunPublished in: IEEE Access (2017)
Keyphrases
- hash functions
- similarity search
- order preserving
- locality sensitive
- hashing algorithm
- hamming distance
- secret key
- locality sensitive hashing
- model checking
- hash table
- hamming space
- efficient implementation
- encryption scheme
- minimal perfect hash functions
- neural network
- stream cipher
- binary codes
- nearest neighbor search
- block cipher
- signature scheme
- machine learning