A Comparative Study of Stream Ciphers and Hash Functions for RFID Authentications.
Shugo MikamiDai WatanabeKazuo SakiyamaPublished in: RFIDSec Asia (2013)
Keyphrases
- hash functions
- stream cipher
- authentication protocol
- block cipher
- secret key
- data streams
- rfid tags
- similarity search
- order preserving
- locality sensitive
- hashing algorithm
- data distribution
- low cost
- nearest neighbor search
- hamming distance
- locality sensitive hashing
- supply chain
- sliding window
- binary codes
- hash table
- hamming space
- encryption scheme
- knn