Login / Signup
Cryptosystems Resilient to Both Continual Key Leakages and Leakages from Hash Function.
Guangjun Fan
Yongbin Zhou
Chengyu Hu
Dengguo Feng
Published in:
IACR Cryptol. ePrint Arch. (2013)
Keyphrases
</>
hash functions
secret key
block cipher
signature scheme
secure communication
hashing algorithm
similarity search
private key
chaotic map
elliptic curve
hash tables
data distribution
locality sensitive hashing
databases
database
smart card
multi dimensional
nearest neighbor
hash table
machine learning
stream cipher