Sign in

A CellBE-based HPC Application for the Analysis of Vulnerabilities in Cryptographic Hash Functions.

Alessandro CilardoLuigi EspositoAntonio VenieroAntonino MazzeoVicenç BeltranEduard Ayguadé
Published in: HPCC (2010)
Keyphrases
  • hash functions
  • data analysis
  • similarity search
  • databases
  • feature extraction
  • high dimensional
  • multi dimensional
  • order preserving