Login / Signup
Secure Robust Hash Functions and Their Applications in Non-interactive Communications.
Qiming Li
Sujoy Roy
Published in:
Int. J. Digit. Crime Forensics (2010)
Keyphrases
</>
hash functions
stream cipher
locality sensitive
block cipher
similarity search
signature scheme
encryption scheme
hashing algorithm
data sets
databases
neural network
query processing
authentication protocol
group communication