Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions.
Rongmao ChenYi MuGuomin YangWilly SusiloFuchun GuoMingwu ZhangPublished in: IACR Cryptol. ePrint Arch. (2016)
Keyphrases
- hash functions
- similarity search
- locality sensitive
- locality sensitive hashing
- hashing algorithm
- data distribution
- hamming distance
- intrusion detection
- secret key
- block cipher
- order preserving
- hash table
- pattern recognition
- intrusion detection system
- nearest neighbor search
- network security
- minimal perfect hash functions
- machine learning
- signature scheme
- metric space
- lightweight
- binary codes
- anomaly detection
- multi dimensional
- hashing methods
- nearest neighbor
- databases
- data sets
- database