Login / Signup
A secure hash function based on feedback iterative structure.
Yijun Yang
Fei Chen
Jianyong Chen
Yong Zhang
Kai-Leung Yung
Published in:
Enterp. Inf. Syst. (2019)
Keyphrases
</>
hash functions
stream cipher
pattern recognition
hash table
database
face recognition
similarity search
provably secure