Security Proofs for Hash Tree Time-Stamping Using Hash Functions with Small Output Size.
Ahto BuldasRisto LaanojaPublished in: ACISP (2013)
Keyphrases
- hash functions
- hash table
- stream cipher
- encryption scheme
- hashing algorithm
- similarity search
- locality sensitive
- block cipher
- random projections
- locality sensitive hashing
- order preserving
- hamming distance
- hashing methods
- tree structure
- hamming space
- data distribution
- secret key
- security requirements
- data sets
- minimal perfect hash functions
- approximate similarity search
- security analysis
- nearest neighbor search
- signature scheme
- input data
- similarity measure
- database systems
- machine learning