Cryptanalysis of a user authentication scheme using hash functions.
Sung-Woon LeeHyun-Sung KimKee-Young YooPublished in: ACM SIGOPS Oper. Syst. Rev. (2004)
Keyphrases
- hash functions
- authentication scheme
- secret key
- user authentication
- authentication protocol
- similarity search
- order preserving
- locality sensitive
- image encryption
- hamming distance
- block cipher
- smart card
- locality sensitive hashing
- signature scheme
- security flaws
- encryption scheme
- public key
- nearest neighbor search
- data distribution
- high dimensional
- data mining
- data sets