SECURE ROBUST HASH FUNCTIONS 1 Secure Robust Hash Functions and Their Applications in Non-interactive Communications

Abstract

A robust hash function allows different parties to extract a consistent key from a common fuzzy source (e.g., an image gone through noisy channels), which can then be used to establish a cryptographic session key among the parties without the need for interactions. These functions are useful in various communication scenarios, where the security notions are… (More)

Topics

1 Figure or Table

Slides referencing similar topics