Constructing Secure Hash Functions by Enhancing Merkle-Damgård Construction.
Praveen GauravaramWilliam MillanEd DawsonKapali ViswanathanPublished in: ACISP (2006)
Keyphrases
- hash functions
- stream cipher
- block cipher
- authentication protocol
- encryption scheme
- hashing algorithm
- locality sensitive
- similarity search
- random projections
- order preserving
- minimal perfect hash functions
- locality sensitive hashing
- security analysis
- secret key
- nearest neighbor search
- data distribution
- key management
- hamming distance
- standard model
- hash table
- binary codes
- dimensionality reduction
- high dimensional
- data structure
- feature extraction
- decision trees
- data mining
- approximate similarity search
- neural network