Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships.
Mohammad Reza ReyhanitabarWilly SusiloYi MuPublished in: FSE (2010)
Keyphrases
- hash functions
- block cipher
- stream cipher
- high security
- encryption scheme
- similarity search
- locality sensitive
- information security
- hashing algorithm
- locality sensitive hashing
- authentication protocol
- security analysis
- security requirements
- hash table
- hamming distance
- data distribution
- approximate similarity search
- minimal perfect hash functions
- hamming space
- data sets
- order preserving
- private key
- security issues
- pattern recognition
- feature extraction
- database systems