Login / Signup
Open problems in hash function security.
Elena Andreeva
Bart Mennink
Bart Preneel
Published in:
Des. Codes Cryptogr. (2015)
Keyphrases
</>
open problems
hash functions
stream cipher
provably secure
encryption scheme
block cipher
database theory
similarity search
hashing algorithm
secret key
security analysis
locality sensitive hashing
access control
security requirements
hamming distance
hash tables
hash table
integer wavelet transform
management system
security protocols
nearest neighbor search
databases
multidatabase transaction management
binary codes