(Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others.
Shuang WuDengguo FengWenling WuJian GuoLe DongJian ZouPublished in: FSE (2012)
Keyphrases
- block cipher
- hash functions
- secret key
- similarity search
- chaotic map
- hashing algorithm
- s box
- locality sensitive hashing
- lightweight
- data distribution
- hyperplane
- nearest neighbor search
- stream cipher
- hamming distance
- hash table
- high dimensional
- data mining
- integer wavelet transform
- databases
- encryption scheme
- database
- hash tables
- neural network