Separating two roles of hashing in one-way message authentication.
Long Hoang NguyenA. W. RoscoePublished in: IACR Cryptol. ePrint Arch. (2009)
Keyphrases
- image authentication
- data structure
- identity authentication
- nearest neighbor search
- file organization
- biometric authentication
- authentication mechanism
- security analysis
- order preserving
- authentication scheme
- fragile watermarking
- session initiation protocol
- hash tables
- user authentication
- digital watermarking
- locality sensitive hashing
- communication channels
- hamming distance
- hash functions
- identity management
- security mechanisms
- public key
- linear hashing
- locality sensitive
- factor authentication
- message transmission
- similarity search