Evaluating the Security of Merkle-Damgård Hash Functions and Combiners in Quantum Settings.
Zhenzhen BaoJian GuoShun LiPhuong PhamPublished in: IACR Cryptol. ePrint Arch. (2022)
Keyphrases
- hash functions
- stream cipher
- encryption scheme
- authentication protocol
- block cipher
- order preserving
- similarity search
- locality sensitive
- information security
- hashing algorithm
- access control
- high security
- locality sensitive hashing
- secret key
- security issues
- standard model
- data distribution
- hash table
- hamming space
- security analysis
- key management
- nearest neighbor search
- security requirements
- minimal perfect hash functions
- face recognition
- hashing methods
- security mechanisms
- high dimensional