Login / Signup
Preimage Attacks on Step-Reduced SM3 Hash Function.
Jian Zou
Wenling Wu
Shuang Wu
Bozhan Su
Le Dong
Published in:
ICISC (2011)
Keyphrases
</>
hash functions
stream cipher
block cipher
similarity search
hashing algorithm
locality sensitive hashing
hamming distance
multi dimensional
secret key
integer wavelet transform
chaotic map
pattern recognition
hash table
hashing methods
database systems
hash tables
nearest neighbor search
image coding
knn