Login / Signup
Hardware Implementations of a Variant of the Zémor-Tillich Hash Function: Can a Provably Secure Hash Function be very efficient ?
Giacomo de Meulenaer
Christophe Petit
Jean-Jacques Quisquater
Published in:
IACR Cryptol. ePrint Arch. (2009)
Keyphrases
</>
provably secure
hash functions
hashing algorithm
similarity search
hamming distance
data distribution
wireless sensor networks
signature scheme
key management
authentication protocol
hash table
low cost
lightweight
secret key
standard model
hashing methods