Quantum security of hash functions and property-preservation of iterated hashing.
Ben HamlinFang SongPublished in: CoRR (2019)
Keyphrases
- hash functions
- stream cipher
- encryption scheme
- locality sensitive
- hashing algorithm
- similarity search
- order preserving
- block cipher
- locality sensitive hashing
- approximate nearest neighbor search
- hashing methods
- random projections
- hamming distance
- hamming space
- hash tables
- hash table
- data distribution
- nearest neighbor search
- security requirements
- secret key
- key management
- security mechanisms
- security analysis
- signature scheme
- query processing
- feature space
- data structure
- training data
- neural network