<--- Back to Details
First PageDocument Content
Search algorithms / Information retrieval / Information science / Cryptography / Hashing / Cryptographic hash functions / Error detection and correction / Hash function / Hash table / Hopf decomposition / Compound of twelve pentagonal antiprisms with rotational freedom
Date: 2018-06-14 07:12:40
Search algorithms
Information retrieval
Information science
Cryptography
Hashing
Cryptographic hash functions
Error detection and correction
Hash function
Hash table
Hopf decomposition
Compound of twelve pentagonal antiprisms with rotational freedom

Time-memory Trade-offs for Near-collisions Ga¨etan Leurent UCL Crypto Group Abstract. In this work we consider generic algorithms to find nearcollisions for a hash function. If we consider o

Add to Reading List

Source URL: who.rocq.inria.fr

Download Document from Source Website

File Size: 327,88 KB

Share Document on Facebook

Similar Documents

MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity Martin Albrecht1 , Lorenzo Grassi3 , Christian Rechberger2,3 , Arnab Roy2 , and Tyge Tiessen2 1

MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity Martin Albrecht1 , Lorenzo Grassi3 , Christian Rechberger2,3 , Arnab Roy2 , and Tyge Tiessen2 1

DocID: 1xUN2 - View Document

Introduction to Locality-Sensitive Hashing Tyler NeylonFormats: html | pdf | kindle pdf] Locality-sensitive hashing (LSH) is a set of techniques that

Introduction to Locality-Sensitive Hashing Tyler NeylonFormats: html | pdf | kindle pdf] Locality-sensitive hashing (LSH) is a set of techniques that

DocID: 1xTR9 - View Document

Proceedings: Equality and Hashing for (Almost) Free: Generating Implementations from Abstraction Functions

Proceedings: Equality and Hashing for (Almost) Free: Generating Implementations from Abstraction Functions

DocID: 1xTdH - View Document