On the security of the Rescue hash function.
Tim BeyneAnne CanteautGregor LeanderMaría Naya-PlasenciaLéo PerrinFriedrich WiemerPublished in: IACR Cryptol. ePrint Arch. (2020)
Keyphrases
- hash functions
- stream cipher
- encryption scheme
- provably secure
- block cipher
- similarity search
- hashing algorithm
- information security
- access control
- hamming distance
- security requirements
- hash table
- secret key
- hash tables
- chaotic map
- diffie hellman
- standard model
- binary codes
- security analysis
- security policies
- databases
- hamming space
- security model
- locality sensitive hashing
- data distribution
- query processing