Do Broken Hash Functions Affect the Security of Time-Stamping Schemes?
Ahto BuldasSven LaurPublished in: ACNS (2006)
Keyphrases
- hash functions
- provably secure
- stream cipher
- similarity search
- encryption scheme
- locality sensitive
- authentication protocol
- order preserving
- hamming distance
- locality sensitive hashing
- hash table
- block cipher
- hashing algorithm
- information security
- security issues
- minimal perfect hash functions
- data mining
- secret key
- security protocols
- nearest neighbor search
- signature scheme
- access control
- binary codes
- approximate similarity search
- hashing methods
- key agreement
- hamming space
- security analysis
- user authentication
- key management
- security requirements
- metric space
- smart card
- lightweight
- feature extraction