Login / Signup
Optimal Security for Keyed Hash Functions: Avoiding Time-Space Tradeoffs for Finding Collisions.
Cody Freitag
Ashrujit Ghoshal
Ilan Komargodski
Published in:
EUROCRYPT (4) (2023)
Keyphrases
</>
hash functions
stream cipher
encryption scheme
hash table
similarity search
locality sensitive
access control
feature extraction
order preserving
low dimensional
security requirements
nearest neighbor
block cipher
management system
training set
database systems
hamming space