An Attack on Two Hash Functions by Zheng-Matsumoto-Imai.
Bart PreneelRené GovaertsJoos VandewallePublished in: AUSCRYPT (1992)
Keyphrases
- binary codes
- hash functions
- block cipher
- secret key
- hamming distance
- similarity search
- authentication protocol
- locality sensitive hashing
- locality sensitive
- hamming space
- order preserving
- hashing algorithm
- encryption scheme
- nearest neighbor search
- databases
- hash table
- pseudorandom
- multi dimensional
- public key
- signature scheme
- stream cipher
- nearest neighbor
- database
- minimal perfect hash functions