Preimage Attacks On Provably Secure FFT Hashing proposed at Second Hash Workshop in 2006.
Donghoon ChangPublished in: IACR Cryptol. ePrint Arch. (2006)
Keyphrases
- provably secure
- hash functions
- hashing algorithm
- similarity search
- blind signature
- hashing methods
- hash table
- locality sensitive hashing
- hamming distance
- frequency domain
- signature scheme
- data distribution
- blind signature scheme
- secret key
- bilinear pairings
- cryptographic protocols
- security protocols
- data streams
- similarity measure
- watermarking algorithm
- watermarking scheme
- data structure