• search
    search
  • reviewers
    reviewers
  • feeds
    feeds
  • assignments
    assignments
  • settings
  • logout

A secure hash function based on feedback iterative structure.

Yijun YangFei ChenJianyong ChenYong ZhangKai-Leung Yung
Published in: Enterp. Inf. Syst. (2019)
Keyphrases
  • hash functions
  • stream cipher
  • pattern recognition
  • hash table
  • database
  • face recognition
  • similarity search
  • provably secure