New indifferentiability security proof of MDPH hash function.
Chun GuoTetsu IwataKazuhiko MinematsuPublished in: IET Inf. Secur. (2022)
Keyphrases
- hash functions
- stream cipher
- provably secure
- encryption scheme
- block cipher
- similarity search
- secret key
- hash table
- hash tables
- chaotic map
- information security
- access control
- hamming distance
- locality sensitive hashing
- data distribution
- hashing algorithm
- security analysis
- neural network
- signature scheme
- security model
- key management
- security policies
- multi dimensional
- high dimensional
- standard model
- binary codes
- diffie hellman
- high security
- integer wavelet transform