Login / Signup
(Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others (Extended Version).
Shuang Wu
Dengguo Feng
Wenling Wu
Jian Guo
Le Dong
Jian Zou
Published in:
IACR Cryptol. ePrint Arch. (2012)
Keyphrases
</>
block cipher
hash functions
secret key
similarity search
chaotic map
locality sensitive hashing
hashing algorithm
provably secure
s box
hamming space
database
integer wavelet transform
stream cipher
hash table
hamming distance
hyperplane
data distribution
databases
hash tables
feature extraction
database systems