Requirements for cryptographic hash functions.
Fritz BauspießFrank DammPublished in: Comput. Secur. (1992)
Keyphrases
- hash functions
- similarity search
- locality sensitive
- random projections
- order preserving
- approximate nearest neighbor search
- hamming distance
- encryption scheme
- secret key
- hash table
- data distribution
- hashing algorithm
- locality sensitive hashing
- stream cipher
- high dimensional
- hashing methods
- nearest neighbor search
- approximate similarity search
- hamming space
- space efficient
- binary codes