Login / Signup
The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function.
Jian Guo
Jérémy Jean
Gaëtan Leurent
Thomas Peyrin
Lei Wang
Published in:
IACR Cryptol. ePrint Arch. (2014)
Keyphrases
</>
hash functions
block cipher
secret key
similarity search
hashing algorithm
chaotic map
hash table
pseudorandom
authentication scheme
locality sensitive hashing
data distribution
hamming distance
hash tables
encryption scheme
stream cipher
integer wavelet transform
binary codes
hyperplane