Login / Signup
On the Length of Cryptographic Hash-Values Used in Identification Schemes.
Marc Girault
Jacques Stern
Published in:
CRYPTO (1994)
Keyphrases
</>
hash functions
stopping criteria
data structure
smart card
attribute values
user defined
website
locality sensitive hashing
provably secure
cryptographic algorithms
hashing algorithm