Reviving the Idea of Incremental Cryptography for the Zettabyte Era Use Case: Incremental Hash Functions Based on SHA-3.
Hristina MihajloskaDanilo GligoroskiSimona SamardjiskaPublished in: iNetSeC (2015)
Keyphrases
- hash functions
- incremental learning
- locality sensitive
- cellular automata
- order preserving
- high dimensional
- hamming distance
- databases
- data distribution
- hashing algorithm
- approximate nearest neighbor search
- locality sensitive hashing
- similarity search
- database management systems
- data management
- feature vectors
- pattern recognition
- feature extraction