Login / Signup
Preimage and Pseudo-Collision Attacks on Step-Reduced SM3 Hash Function.
Gaoli Wang
Yanzhao Shen
Published in:
IACR Cryptol. ePrint Arch. (2012)
Keyphrases
</>
hash functions
stream cipher
block cipher
chaotic map
hash table
hashing algorithm
similarity search
hamming distance
secret key
locality sensitive hashing
machine learning
image quality