Login / Signup

A secure hash function based on feedback iterative structure.

Yijun YangFei ChenJianyong ChenYong ZhangKai-Leung Yung
Published in: Enterp. Inf. Syst. (2019)
Keyphrases
  • hash functions
  • stream cipher
  • pattern recognition
  • hash table
  • database
  • face recognition
  • similarity search
  • provably secure