Collision Attack on the Waterfall Hash Function.
Scott R. FluhrerPublished in: IACR Cryptol. ePrint Arch. (2008)
Keyphrases
- hash functions
- block cipher
- secret key
- similarity search
- chaotic map
- locality sensitive hashing
- hashing algorithm
- authentication scheme
- data distribution
- integer wavelet transform
- hamming distance
- hash table
- encryption scheme
- hash tables
- nearest neighbor search
- lightweight
- similarity measure
- database
- stream cipher
- hamming space
- diffie hellman
- ciphertext
- signature scheme
- metric space
- high dimensional
- neural network