Finding Collisions on a Public Road, or Do Secure Hash Functions Need Secret Coins?
Chun-Yuan HsiaoLeonid ReyzinPublished in: CRYPTO (2004)
Keyphrases
- hash functions
- stream cipher
- secret key
- block cipher
- encryption scheme
- order preserving
- authentication protocol
- similarity search
- secret sharing
- locality sensitive hashing
- hashing algorithm
- trusted third party
- secret sharing scheme
- key management
- security requirements
- machine learning
- security analysis
- database
- hamming distance
- data streams
- neural network