On an almost-universal hash function family with applications to authentication and secrecy codes.
Khodakhast BibakBruce M. KapronS. VenkateshLászló TóthPublished in: IACR Cryptol. ePrint Arch. (2015)
Keyphrases
- hash functions
- authentication protocol
- key distribution
- hashing methods
- secret key
- mutual authentication
- binary codes
- security analysis
- similarity search
- locality sensitive hashing
- encryption scheme
- authentication scheme
- signature scheme
- hashing algorithm
- hamming distance
- user authentication
- provably secure
- key management
- hash table
- hash tables
- nearest neighbor search
- stream cipher
- integer wavelet transform
- spread spectrum
- security properties
- error correction
- image authentication
- data distribution
- high dimensional data
- similarity measure