Login / Signup
Leakage Resilient l-more Extractable Hash and Applications to Non-Malleable Cryptography.
Aggelos Kiayias
Feng-Hao Liu
Yiannis Tselekounis
Published in:
IACR Cryptol. ePrint Arch. (2022)
Keyphrases
</>
hash functions
cellular automata
b tree
data structure
similarity search
orthonormal basis
locality sensitive hashing
information security
neural network
social networks
artificial intelligence
multi agent
case study
web services
website
computer vision
encryption algorithms
hashing algorithm