Login / Signup
Hash function requirements for Schnorr signatures.
Gregory Neven
Nigel P. Smart
Bogdan Warinschi
Published in:
J. Math. Cryptol. (2009)
Keyphrases
</>
hash functions
signature scheme
binary codes
similarity search
hashing algorithm
hash table
locality sensitive hashing
chaotic map
hamming distance
stream cipher
provably secure
hash tables
data distribution
secret key
nearest neighbor search
image coding
integer wavelet transform