The power of primes: security of authentication based on a universal hash-function family.
Basel AlomairAndrew ClarkRadha PoovendranPublished in: J. Math. Cryptol. (2010)
Keyphrases
- hash functions
- authentication protocol
- stream cipher
- user authentication
- encryption scheme
- security analysis
- authentication scheme
- secret key
- similarity search
- security requirements
- provably secure
- security mechanisms
- data encryption
- authentication mechanism
- integrity verification
- block cipher
- key distribution
- locality sensitive hashing
- hashing algorithm
- image authentication
- secure communication
- hamming distance
- information security
- integer wavelet transform
- factor authentication
- private key
- virtual private network
- security issues
- key management
- nearest neighbor search
- security model
- security policies
- high security
- public key
- hashing methods
- security protocols
- hash table
- security properties
- signature scheme
- hash tables
- pseudorandom
- data distribution
- access control
- high dimensional
- training set
- pattern recognition
- data sets
- database