Login / Signup
Security of Iterated Hash Functions Based on Block Ciphers.
Walter Hohl
Xuejia Lai
Thomas Meier
Christian Waldvogel
Published in:
CRYPTO (1993)
Keyphrases
</>
block cipher
hash functions
similarity search
locality sensitive
order preserving
stream cipher
locality sensitive hashing
lightweight
s box
encryption scheme
hamming distance
secret key
nearest neighbor search
data distribution
security protocols
data sets
application layer
databases