Login / Signup

On the Length of Cryptographic Hash-Values Used in Identification Schemes.

Marc GiraultJacques Stern
Published in: CRYPTO (1994)
Keyphrases
  • hash functions
  • stopping criteria
  • data structure
  • smart card
  • attribute values
  • user defined
  • website
  • locality sensitive hashing
  • provably secure
  • cryptographic algorithms
  • hashing algorithm