Computationally Sound Symbolic Secrecy in the Presence of Hash Functions.
Véronique CortierSteve KremerRalf KüstersBogdan WarinschiPublished in: FSTTCS (2006)
Keyphrases
- hash functions
- order preserving
- similarity search
- locality sensitive
- hashing algorithm
- random projections
- approximate nearest neighbor search
- hamming distance
- minimal perfect hash functions
- locality sensitive hashing
- data distribution
- hash table
- security analysis
- approximate similarity search
- databases
- encryption scheme
- image processing
- block cipher
- signature scheme