Login / Signup
On the security of non-forgeable robust hash functions.
Qiming Li
Sujoy Roy
Published in:
ICIP (2008)
Keyphrases
</>
hash functions
stream cipher
similarity search
block cipher
encryption scheme
order preserving
information security
locality sensitive
high dimensional
multi dimensional
security requirements
nearest neighbor search
secret key
authentication protocol