On the Security of the Double-Block-Length Hash Function NCASH.
Tapadyoti BanerjeeDipanwita Roy ChowdhuryPublished in: ATIS (2019)
Keyphrases
- hash functions
- stream cipher
- provably secure
- encryption scheme
- block cipher
- similarity search
- hash table
- hash tables
- secret key
- hashing algorithm
- locality sensitive hashing
- data distribution
- security requirements
- hamming distance
- information security
- key management
- nearest neighbor search
- security protocols
- authentication scheme
- block size
- binary codes
- access control
- database systems