Weak Security Notions of Cryptographic Unkeyed Hash Functions and Their Amplifiability.
Shoichi HirosePublished in: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. (2005)
Keyphrases
- hash functions
- stream cipher
- encryption scheme
- provably secure
- authentication protocol
- similarity search
- block cipher
- hashing algorithm
- locality sensitive
- order preserving
- locality sensitive hashing
- secret key
- key management
- hamming distance
- security analysis
- minimal perfect hash functions
- access control
- information security
- signature scheme
- data distribution
- security requirements
- security issues
- network security
- databases
- nearest neighbor search
- security protocols
- standard model
- security properties
- image encryption
- high security
- encryption decryption
- data sets