The legal and practical implications of recent attacks on 128-bit cryptographic hash functions.
Praveen GauravaramAdrian McCullaghEd DawsonPublished in: First Monday (2006)
Keyphrases
- hash functions
- block cipher
- stream cipher
- similarity search
- hash table
- s box
- locality sensitive
- order preserving
- hash tables
- hashing algorithm
- locality sensitive hashing
- data distribution
- hamming distance
- nearest neighbor search
- neural network
- encryption scheme
- secret key
- knn
- lightweight
- differential power analysis
- binary codes
- initial conditions
- signature scheme
- high dimensional data
- nearest neighbor
- data analysis