Login / Signup
On a Construction of Stream-cipher-based Hash Functions.
Yuto Nakano
Jun Kurihara
Shinsaku Kiyomoto
Toshiaki Tanaka
Published in:
SECRYPT (2010)
Keyphrases
</>
stream cipher
hash functions
secret key
similarity search
locality sensitive
order preserving
hamming distance
locality sensitive hashing
data distribution
nearest neighbor search
security analysis
hashing methods
block cipher
data model
signature scheme
pattern recognition
ciphertext
pseudorandom
databases
database