Cryptographic Hash Standards: Where Do We Go from Here?
William E. BurrPublished in: IEEE Secur. Priv. (2006)
Keyphrases
- hash functions
- widely accepted
- hashing algorithm
- smart card
- web services
- data structure
- locality sensitive hashing
- similarity search
- genetic algorithm
- hash table
- hamming distance
- data distribution
- nearest neighbor search
- binary codes
- open source
- iso iec
- s box
- similarity measure
- ims qti
- information retrieval
- packet filtering