Authenticated Encryption Based on Lesamnta-LW Hashing Mode.
Shoichi HiroseHidenori KuwakadoHirotaka YoshidaPublished in: ICISC (2019)
Keyphrases
- key exchange
- hash functions
- encryption scheme
- order preserving
- secret key
- security analysis
- key distribution
- key exchange protocol
- file organization
- digital signature
- key management
- nearest neighbor search
- data structure
- key agreement protocol
- hamming distance
- encryption algorithms
- encryption algorithm
- random projections