Login / Signup
On Existence of Robust Combiners for Cryptographic Hash Functions.
Michal Rjasko
Published in:
ITAT (2009)
Keyphrases
</>
hash functions
similarity search
hashing algorithm
order preserving
locality sensitive
locality sensitive hashing
data distribution
hamming distance
secret key
encryption scheme
hash table
stream cipher
database
image matching
nearest neighbor search
hamming space