Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions.
Rongmao ChenYi MuGuomin YangWilly SusiloFuchun GuoMingwu ZhangPublished in: ASIACRYPT (1) (2016)
Keyphrases
- hash functions
- similarity search
- locality sensitive
- hashing algorithm
- order preserving
- locality sensitive hashing
- intrusion detection
- hamming distance
- minimal perfect hash functions
- packet filtering
- data distribution
- network traffic
- neural network
- hash table
- network security
- intrusion detection system
- databases
- stream cipher
- pattern recognition
- secret key
- nearest neighbor search
- input data
- block cipher
- similarity measure
- face recognition
- signature scheme
- hamming space
- smart card