Extending FORK-256 Attack to the Full Hash Function.
Scott ContiniKrystian MatusiewiczJosef PieprzykPublished in: ICICS (2007)
Keyphrases
- hash functions
- secret key
- block cipher
- similarity search
- hashing algorithm
- stream cipher
- locality sensitive hashing
- hamming distance
- chaotic map
- hash tables
- provably secure
- hash table
- hamming space
- authentication scheme
- key management
- nearest neighbor search
- data distribution
- diffie hellman
- pseudorandom
- encryption scheme
- feature extraction