New Attacks on all Double Block Length Hash Functions of Hash Rate 1, including the Parallel-DM.
Lars R. KnudsenXuejia LaiPublished in: EUROCRYPT (1994)
Keyphrases
- hash functions
- stream cipher
- block cipher
- hashing algorithm
- locality sensitive
- order preserving
- similarity search
- random projections
- locality sensitive hashing
- hash table
- nearest neighbor search
- hashing methods
- data distribution
- hamming distance
- minimal perfect hash functions
- signature scheme
- decision makers
- encryption scheme
- binary codes
- feature selection
- machine learning
- data sets
- secret key
- high dimensional data
- data structure
- feature extraction
- hash tables
- decision trees