Login / Signup
Authenticated Hash Tables Based on Cryptographic Accumulators.
Charalampos Papamanthou
Roberto Tamassia
Nikos Triandopoulos
Published in:
Algorithmica (2016)
Keyphrases
</>
hash tables
hash functions
hash table
locality sensitive hashing
similarity search
hashing methods
hamming distance
secret key
data distribution
nearest neighbor search
encryption scheme
smart card
binary codes