Computationally Sound Symbolic Secrecy in the Presence of Hash Functions.
Véronique CortierSteve KremerRalf KüstersBogdan WarinschiPublished in: IACR Cryptol. ePrint Arch. (2006)
Keyphrases
- hash functions
- hashing algorithm
- locality sensitive
- similarity search
- order preserving
- hamming distance
- locality sensitive hashing
- random projections
- data mining
- approximate nearest neighbor search
- data distribution
- hash table
- encryption scheme
- block cipher
- key distribution
- key management
- neural network
- hashing methods
- nearest neighbor search
- pattern matching
- high dimensional
- feature space
- face recognition
- minimal perfect hash functions