Comparative Analysis of the Hardware Implementations of Hash Functions SHA-1 and SHA-512.
Tim GrembowskiRoar LienKris GajNghi NguyenPeter BellowsJaroslav FlidrTom LehmanBrian SchottPublished in: ISC (2002)
Keyphrases
- hash functions
- comparative analysis
- similarity search
- order preserving
- random projections
- locality sensitive hashing
- approximate nearest neighbor search
- hashing algorithm
- locality sensitive
- nearest neighbor search
- semi quantitative
- data distribution
- hamming distance
- binary codes
- hamming space
- hash table
- stream cipher
- fusion scheme
- database systems
- machine learning
- minimal perfect hash functions
- data sets
- block cipher
- secret key
- image data
- databases