Herding Hash Functions and the Nostradamus Attack.
John KelseyTadayoshi KohnoPublished in: IACR Cryptol. ePrint Arch. (2005)
Keyphrases
- hash functions
- block cipher
- secret key
- authentication protocol
- similarity search
- locality sensitive
- order preserving
- locality sensitive hashing
- hashing algorithm
- approximate nearest neighbor search
- hash table
- data distribution
- hamming distance
- encryption scheme
- pseudorandom
- database
- neural network
- binary codes
- nearest neighbor search
- dimensionality reduction
- pattern recognition