Second Preimage Attacks on Dithered Hash Functions.
Elena AndreevaCharles BouillaguetPierre-Alain FouqueJonathan J. HochJohn KelseyAdi ShamirSébastien ZimmerPublished in: EUROCRYPT (2008)
Keyphrases
- hash functions
- stream cipher
- block cipher
- similarity search
- locality sensitive
- order preserving
- hashing algorithm
- hamming distance
- secret key
- data distribution
- locality sensitive hashing
- security protocols
- hamming space
- approximate similarity search
- hashing methods
- hash table
- nearest neighbor search
- dual space
- watermarking scheme
- high dimensional
- support vector
- databases