New Constructions for Secure Hash Functions.
William AielloStuart HaberRamarathnam VenkatesanPublished in: FSE (1998)
Keyphrases
- hash functions
- stream cipher
- block cipher
- authentication protocol
- encryption scheme
- order preserving
- similarity search
- secret key
- hashing algorithm
- locality sensitive
- key management
- hamming space
- locality sensitive hashing
- data distribution
- hamming distance
- hash table
- minimal perfect hash functions
- pattern recognition
- security protocols
- nearest neighbor search
- management system
- standard model
- cryptographic protocols
- binary codes
- security analysis
- security requirements
- lightweight
- database systems