Efficient implementation of the keyed-hash message authentication code (HMAC) using the SHA-1 hash function.
Harris E. MichailAthanasios P. KakarountasAthanasios MilidonisCostas E. GoutisPublished in: ICECS (2004)
Keyphrases
- hash functions
- efficient implementation
- authentication protocol
- binary codes
- hashing algorithm
- similarity search
- locality sensitive hashing
- active set
- hash table
- authentication scheme
- data distribution
- hamming distance
- secret key
- hash tables
- hamming space
- integer wavelet transform
- provably secure
- image authentication
- nearest neighbor search
- block cipher
- user authentication
- high dimensional
- data sets