Login / Signup
On the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order Groups.
Goichiro Hanaoka
Takahiro Matsuda
Jacob C. N. Schuldt
Published in:
CRYPTO (2012)
Keyphrases
</>
hash functions
low cost
neural network
database systems
data model
similarity search
euclidean distance
smart card
brute force