On an Almost-Universal Hash Function Family with Applications to Authentication and Secrecy Codes.
Khodakhast BibakBruce M. KapronSrinivasan VenkateshLászló TóthPublished in: Int. J. Found. Comput. Sci. (2018)
Keyphrases
- hash functions
- authentication protocol
- key distribution
- hashing methods
- secret key
- mutual authentication
- security analysis
- binary codes
- encryption scheme
- similarity search
- hashing algorithm
- error correction
- hash table
- signature scheme
- stream cipher
- authentication scheme
- hash tables
- nearest neighbor search
- locality sensitive hashing
- hamming distance
- user authentication
- provably secure
- key management
- smart card
- private key
- image authentication
- block cipher
- security mechanisms
- data distribution
- multi dimensional