An attack on hash function HAVAL-128.
Xiaoyun WangDengguo FengXiuyuan YuPublished in: Sci. China Ser. F Inf. Sci. (2005)
Keyphrases
- hash functions
- block cipher
- secret key
- similarity search
- hashing algorithm
- chaotic map
- authentication scheme
- locality sensitive hashing
- stream cipher
- hash table
- pseudorandom
- ciphertext
- hamming space
- encryption scheme
- nearest neighbor search
- hamming distance
- smart card
- neural network
- data sets
- binary codes
- diffie hellman
- provably secure
- hash tables
- data distribution
- integer wavelet transform
- nearest neighbor