Aggregated Authentication (AMAC) Using Universal Hash Functions.
Wassim ZnaidiMarine MinierCédric LauradouxPublished in: SecureComm (2009)
Keyphrases
- hash functions
- authentication protocol
- similarity search
- hashing algorithm
- user authentication
- locality sensitive
- approximate nearest neighbor search
- order preserving
- locality sensitive hashing
- data distribution
- hamming distance
- encryption scheme
- secret key
- security mechanisms
- security analysis
- minimal perfect hash functions
- neural network
- hash table
- stream cipher
- database systems
- data sets