Login / Signup
Keyed hash function using Bernoulli shift map.
Prathuri Jhansi Rani
S. Durga Bhavani
Published in:
Int. J. Inf. Comput. Secur. (2017)
Keyphrases
</>
hash functions
similarity search
hashing algorithm
locality sensitive hashing
chaotic map
stream cipher
hash table
hash tables
data distribution
hamming distance
nearest neighbor search
secret key
databases
data mining
signature scheme
provably secure