On a variant of multilinear modular hashing with applications to authentication and secrecy codes.
Khodakhast BibakBruce M. KapronVenkatesh SrinivasanLászló TóthPublished in: ISITA (2016)
Keyphrases
- key distribution
- security analysis
- hashing methods
- binary codes
- higher order
- mutual authentication
- error correction
- modular structure
- key management
- hash functions
- user authentication
- data structure
- authentication scheme
- authentication protocol
- high order
- random projections
- authentication mechanism
- hash tables
- hashing algorithm
- principal component analysis
- order preserving
- secret key
- hamming distance
- biometric authentication
- file organization
- hash table
- gray code
- public key
- fault tolerant
- fragile watermarking