On the Security of Keyed Hashing Based on Public Permutations.
Jonathan FuchsYann RotellaJoan DaemenPublished in: CRYPTO (3) (2023)
Keyphrases
- security issues
- network security
- data structure
- security problems
- computer security
- information security
- intrusion detection
- functional requirements
- access control
- information assurance
- security management
- cyber security
- security requirements
- security policies
- probability distribution
- random projections
- security level
- locality sensitive hashing
- similarity search
- security measures
- anomaly detection
- database systems
- malware detection
- security systems
- data security
- hash functions
- security mechanisms
- statistical databases
- network management
- biometric systems