Login / Signup
Improvement on a Trapdoor Hash Function.
Fuw-Yi Yang
Published in:
Int. J. Netw. Secur. (2009)
Keyphrases
</>
hash functions
similarity search
locality sensitive hashing
hashing algorithm
chaotic map
hash tables
stream cipher
secret key
nearest neighbor search
hamming distance
neural network
hash table
data structure
data sets
binary codes
block cipher
data distribution