Security Enhancement of the Vortex Family of Hash Functions.
Shay GueronMichael E. KounavisPublished in: IACR Cryptol. ePrint Arch. (2011)
Keyphrases
- hash functions
- stream cipher
- encryption scheme
- authentication protocol
- locality sensitive
- block cipher
- similarity search
- hashing algorithm
- information security
- order preserving
- locality sensitive hashing
- secret key
- data distribution
- security issues
- hamming distance
- security requirements
- image enhancement
- access control
- approximate similarity search
- hamming space
- security analysis
- database systems
- standard model
- hash table
- security mechanisms
- nearest neighbor search
- visual features
- image retrieval
- image processing
- neural network