Efficient and Secure Keyed Hash Function Scheme Based on RC4 Stream Cipher.
Hassan NouraOla SalmanAli ChehabRaphaël CouturierPublished in: ISCC (2020)
Keyphrases
- stream cipher
- hash functions
- scheme for wireless sensor networks
- provably secure
- hashing algorithm
- secret key
- security analysis
- pseudorandom
- similarity search
- locality sensitive hashing
- hash table
- data distribution
- authentication protocol
- key distribution
- high security
- hamming distance
- cost effective
- authentication scheme
- block cipher
- binary codes