Login / Signup
Stream Cipher-Based Hash Function and Its Security.
Yuto Nakano
Jun Kurihara
Shinsaku Kiyomoto
Toshiaki Tanaka
Published in:
ICETE (Selected Papers) (2010)
Keyphrases
</>
stream cipher
hash functions
secret key
similarity search
security analysis
high security
hamming distance
signature scheme
pseudorandom
provably secure
data distribution
public key
encryption scheme
block cipher
image compression
smart card
database
hash tables