More secure version of a Cayley hash function.
Mohammad Hossein GhaffariZohreh MostaghimPublished in: Groups Complex. Cryptol. (2018)
Keyphrases
- hash functions
- stream cipher
- block cipher
- provably secure
- similarity search
- encryption scheme
- chaotic map
- hamming distance
- hash table
- secret key
- hash tables
- data distribution
- hashing algorithm
- locality sensitive hashing
- signature scheme
- nearest neighbor search
- standard model
- hashing methods
- data sets
- data analysis
- integer wavelet transform
- hamming space
- security requirements
- lightweight
- principal component analysis
- multiresolution
- machine learning