A Second Preimage Attack on the Merkle-Damgard Scheme with a Permutation for Hash Functions.
Shiwei ChenChenhui JinPublished in: SECRYPT (2009)
Keyphrases
- hash functions
- block cipher
- secret key
- authentication protocol
- similarity search
- hashing algorithm
- locality sensitive
- order preserving
- provably secure
- locality sensitive hashing
- authentication scheme
- hamming distance
- data distribution
- hashing methods
- stream cipher
- query processing
- minimal perfect hash functions
- encryption scheme
- ciphertext
- data mining
- nearest neighbor search
- hyperplane
- high dimensional
- training data
- database systems