Keyphrases
- hash functions
- hashing algorithm
- locality sensitive
- authentication protocol
- hashing methods
- hash table
- hash tables
- encryption scheme
- locality sensitive hashing
- hamming space
- data structure
- order preserving
- hamming distance
- similarity search
- approximate nearest neighbor search
- secret key
- nearest neighbor search
- security requirements
- security analysis
- covert channel
- authentication scheme
- binary codes
- key distribution
- high dimensional
- identity management
- file organization
- security mechanisms
- hyperplane
- user authentication
- key management
- random projections
- metric space
- data distribution