Performance and Security Tradeoffs in Cryptographic Hash Functions.
Sultan AlmuhammadiOmar Mohammed BawazeerPublished in: Int. J. Interdiscip. Telecommun. Netw. (2020)
Keyphrases
- hash functions
- stream cipher
- encryption scheme
- provably secure
- authentication protocol
- block cipher
- similarity search
- locality sensitive
- order preserving
- hamming distance
- hashing algorithm
- locality sensitive hashing
- security issues
- data distribution
- network security
- information security
- security analysis
- databases
- security requirements
- nearest neighbor search
- minimal perfect hash functions
- public key cryptography
- data sets
- key management
- security mechanisms
- secret key
- training set
- security properties
- standard model
- high security
- data management
- encryption decryption
- machine learning
- neural network