Security of Cyclic Double Block Length Hash Functions including Abreast-DM.
Ewan FleischmannMichael GorskiStefan LucksPublished in: IACR Cryptol. ePrint Arch. (2009)
Keyphrases
- hash functions
- stream cipher
- encryption scheme
- block cipher
- authentication protocol
- similarity search
- order preserving
- hashing algorithm
- locality sensitive
- locality sensitive hashing
- secret key
- security requirements
- security issues
- hamming distance
- access control
- hamming space
- information security
- security analysis
- binary codes
- data distribution
- hash table
- block size
- hashing methods
- decision makers
- minimal perfect hash functions
- machine learning
- security mechanisms
- nearest neighbor search
- training set
- feature selection