On the Insecurity of the Fiat-Shamir Signatures with Iterative Hash Functions.
Eiichiro FujisakiRyo NishimakiKeisuke TanakaPublished in: ProvSec (2009)
Keyphrases
- hash functions
- secret key
- binary codes
- signature scheme
- locality sensitive
- similarity search
- hashing algorithm
- order preserving
- random projections
- locality sensitive hashing
- hash table
- minimal perfect hash functions
- hamming space
- hamming distance
- encryption scheme
- signature verification
- secret sharing
- block cipher
- neural network
- data sets
- hashing methods
- data distribution
- distance measure
- high dimensional
- feature extraction