Security of Cyclic Double Block Length Hash Functions.
Ewan FleischmannMichael GorskiStefan LucksPublished in: IMACC (2009)
Keyphrases
- hash functions
- stream cipher
- encryption scheme
- authentication protocol
- block cipher
- hashing algorithm
- locality sensitive
- order preserving
- similarity search
- information security
- security issues
- locality sensitive hashing
- security requirements
- secret key
- hamming distance
- standard model
- security analysis
- high security
- key management
- databases
- similarity measure
- machine learning
- hamming space
- security mechanisms
- hash table
- nearest neighbor search
- smart card
- data mining