Security Definitions for Hash Functions: Combining UCE and Indifferentiability.
Daniel JostUeli MaurerPublished in: SCN (2018)
Keyphrases
- hash functions
- stream cipher
- encryption scheme
- block cipher
- authentication protocol
- similarity search
- locality sensitive
- information security
- order preserving
- hashing algorithm
- security analysis
- hash table
- security requirements
- nearest neighbor search
- secret key
- key management
- hashing methods
- data mining
- locality sensitive hashing
- hamming distance
- access control
- binary codes
- data distribution
- pattern matching
- nearest neighbor
- high dimensional
- databases
- approximate similarity search
- hamming space