Universal Hash-Function Families: From Hashing to Authentication.
Basel AlomairPublished in: AFRICACRYPT (2014)
Keyphrases
- hash functions
- authentication protocol
- hashing algorithm
- similarity search
- locality sensitive
- secret key
- authentication scheme
- approximate nearest neighbor search
- order preserving
- hash tables
- user authentication
- hamming space
- locality sensitive hashing
- hamming distance
- hashing methods
- nearest neighbor search
- hash table
- block cipher
- stream cipher
- data distribution
- image authentication
- security analysis
- data sets
- encryption scheme
- security requirements
- signature scheme
- neural network
- database