A remark on hash functions for message authentication.
Chris J. MitchellDave RushMichael WalkerPublished in: Comput. Secur. (1989)
Keyphrases
- hash functions
- authentication protocol
- similarity search
- locality sensitive
- user authentication
- hashing algorithm
- locality sensitive hashing
- block cipher
- hamming distance
- order preserving
- hash table
- session initiation protocol
- encryption scheme
- minimal perfect hash functions
- security analysis
- nearest neighbor search
- secret key
- data distribution
- hamming space
- stream cipher
- face recognition
- data mining
- data sets