Login / Signup
Slide Attacks on a Class of Hash Functions.
Michael Gorski
Stefan Lucks
Thomas Peyrin
Published in:
ASIACRYPT (2008)
Keyphrases
</>
hash functions
stream cipher
block cipher
similarity search
locality sensitive
hashing algorithm
database
data analysis
approximate similarity search