The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Hash with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1968-1973 (17) 1974-1977 (20) 1978-1980 (18) 1981-1982 (16) 1983-1984 (19) 1985 (16) 1986-1987 (16) 1988-1989 (33) 1990 (33) 1991 (27) 1992 (38) 1993 (28) 1994 (44) 1995 (33) 1996 (36) 1997 (47) 1998 (42) 1999 (62) 2000 (56) 2001 (85) 2002 (139) 2003 (183) 2004 (329) 2005 (415) 2006 (468) 2007 (493) 2008 (494) 2009 (456) 2010 (240) 2011 (205) 2012 (223) 2013 (226) 2014 (182) 2015 (188) 2016 (241) 2017 (229) 2018 (227) 2019 (260) 2020 (232) 2021 (255) 2022 (304) 2023 (278) 2024 (60)
Publication types (Num. hits)
article(2517) book(3) incollection(69) inproceedings(4361) phdthesis(63)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 3717 occurrences of 1502 keywords

Results
Found 7025 publication records. Showing 7013 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
116Donghoon Chang, Kishan Chand Gupta, Mridul Nandi RC4-Hash: A New Hash Function Based on RC4. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Hash Function, Collision Attack, RC4, Preimage Attack
96Phillip G. Bradford, Olga V. Gavrylyako Hash Chains with Diminishing Ranges for Sensors. Search on Bibsonomy ICPP Workshops The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
95George Bebis, Michael Georgiopoulos, Niels da Vitoria Lobo Learning Geometric Hashing Functions for Model-Based Object Recognition. Search on Bibsonomy ICCV The full citation details ... 1995 DBLP  DOI  BibTeX  RDF geometric hashing functions, distribution of invariants, geometric hash function, elastic hash table, hash bins, statistical characteristics, neural network, learning (artificial intelligence), learning, object recognition, indexing, training, invariants, file organisation, topology preserving, self-organizing feature map, self-organising feature maps, elastic net, model-based object recognition
94Jonathan J. Hoch, Adi Shamir Breaking the ICE - Finding Multicollisions in Iterated Concatenated and Expanded (ICE) Hash Functions. Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF iterated hash functions, tree based hash functions, multicollisions, cryptanalysis, Hash functions
83Deukjo Hong, Bart Preneel, Sangjin Lee 0002 Higher Order Universal One-Way Hash Functions. Search on Bibsonomy ASIACRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Collision Resistant Hash Function (CRHF), Universal One-Way Hash Function (UOWHF), Higher Order Universal One-Way Hash Function, Hash Function
80James Aspnes, Muli Safra, Yitong Yin Ranged hash functions and the price of churn. Search on Bibsonomy SODA The full citation details ... 2008 DBLP  BibTeX  RDF
79Edward Omiecinski, Eileen Tien Lin The Adaptive-Hash Join Algorithm for a Hypercube Multicomputer. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 1992 DBLP  DOI  BibTeX  RDF adaptive-hash join algorithm, hybrid-hash, parallel algorithms, hypercube networks, file organisation, nested-loop, hypercube multicomputer
77Deukjo Hong, Jaechul Sung, Seokhie Hong, Sangjin Lee 0002 How to Construct Universal One-Way Hash Functions of Order r. Search on Bibsonomy INDOCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Collision Resistant Hash Function (CRHF), Universal One-Way Hash Function (UOWHF), Higher Order Universal One-Way Hash Function, Hash Function
74Ahto Buldas, Sven Laur Do Broken Hash Functions Affect the Security of Time-Stamping Schemes? Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
74Takahiro Matsuda 0002, Nuttapong Attrapadung, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function. Search on Bibsonomy ProvSec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF target collision resistant hash function, digital signature, standard model, strong unforgeability
72Lars R. Knudsen, Xuejia Lai, Bart Preneel Attacks on Fast Double Block Length Hash Functions. Search on Bibsonomy J. Cryptol. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Cryptanalysis, Cryptanalysis, Block ciphers, Block ciphers, Key words, Cryptographic hash functions, Cryptographic hash functions, Birthday attacks, Birthday attacks, Double block length hash functions, Double block length hash functions
69Martin Dietzfelbinger, Joseph Gil, Yossi Matias, Nicholas Pippenger Polynomial Hash Functions Are Reliable (Extended Abstract). Search on Bibsonomy ICALP The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
68Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu 0001 Enhanced Target Collision Resistant Hash Functions Revisited. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF TCR, eTCR, Hash Functions, CR, Domain Extension
68Florian Mendel, Norbert Pramstaller, Christian Rechberger A (Second) Preimage Attack on the GOST Hash Function. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF cryptanalysis, hash functions, preimage attack
68Haoyu Song 0001, Sarang Dharmapurikar, Jonathan S. Turner, John W. Lockwood Fast hash table lookup using extended bloom filter: an aid to network processing. Search on Bibsonomy SIGCOMM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF hash table, forwarding
68Hui-I Hsiao, Ming-Syan Chen, Philip S. Yu Parallel Execution of Hash Joins in Parallel Databases. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF Hash filters, bushy trees, pipelining, hash joins
67Marc Fischlin Fast Verification of Hash Chains. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Hash tree, Hash function, Certificate, hash chain
65Donghoon Chang, Wonil Lee, Seokhie Hong, Jaechul Sung, Sangjin Lee 0002, Soo Hak Sung Impossibility of Construction of OWHF and UOWHF from PGV Model Based on Block Cipher Secure Against ACPCA. Search on Bibsonomy INDOCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
64Michael Mitzenmacher, Salil P. Vadhan Why simple hash functions work: exploiting the entropy in a data stream. Search on Bibsonomy SODA The full citation details ... 2008 DBLP  BibTeX  RDF
64Ahto Buldas, Aivo Jürgenson Does Secure Time-Stamping Imply Collision-Free Hash Functions? Search on Bibsonomy ProvSec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
64Ilya Mironov Collision-Resistant No More: Hash-and-Sign Paradigm Revisited. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF TCR, UOWHF, Cramer-Shoup, PSS-RSA, signatures, DSA, collision-resistance
64Sang-Uk Shin, Kyung Hyune Rhee, DaeHyun Ryu, Sangjin Lee A New Hash Function Based on MDx-Family and Its Application to MAC. Search on Bibsonomy Public Key Cryptography The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
63Florian Mendel, Norbert Pramstaller, Christian Rechberger, Marcin Kontak, Janusz Szmidt Cryptanalysis of the GOST Hash Function. Search on Bibsonomy CRYPTO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF cryptanalysis, hash function, collision attack, preimage attack, second preimage attack
63Haojun Zhang, Yuefei Zhu Self-Updating Hash Chains and Their Implementations. Search on Bibsonomy WISE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Server-Supported Signature, authentication, updating, hash chain
62Jesang Lee, Seokhie Hong, Jaechul Sung, Haeryong Park A New Double-Block-Length Hash Function Using Feistel Structure. Search on Bibsonomy ISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Block Ciphers, Hash Function, Double Block Length Hash Function
62Kyosuke Yasuda, Takao Miura, Isamu Shioya Distributed Processes on Tree Hash. Search on Bibsonomy COMPSAC (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Tree Hash, Distributed Linear Hash, Distributed Environment
62Sung-Ryul Kim Scalable Hash Chain Traversal for Mobile Devices. Search on Bibsonomy ICCSA (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF efficient hash chain traversal, secure hash, pebbles
62Sung-Ryul Kim Improved Scalable Hash Chain Traversal. Search on Bibsonomy ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF efficient hash chain traversal, secure hash, pebbles
62Norbert Pramstaller, Mario Lamberger, Vincent Rijmen Second Preimages for Iterated Hash Functions and Their Implications on MACs. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF iterated hash functions, block-cipher based hash functions, differential cryptanalysis, second preimage, double block-length hash functions
58Qiming Li, Sujoy Roy On the security of non-forgeable robust hash functions. Search on Bibsonomy ICIP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
58Ivan Damgård, Lars R. Knudsen The Breaking of the AR Hash Function. Search on Bibsonomy EUROCRYPT The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
58Xuejia Lai, James L. Massey Hash Function Based on Block Ciphers. Search on Bibsonomy EUROCRYPT The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
58Jens Claußen, Alfons Kemper, Donald Kossmann, Christian Wiesner Exploiting early sorting and early partitioning for decisionsupport query processing. Search on Bibsonomy VLDB J. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Query processing and optimization, Early sorting and partitioning, Hash joins and hash teams, Performance evaluation, Decision Support Systems
58Hans Vandierendonck, Koenraad De Bosschere XOR-Based Hash Functions. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2005 DBLP  DOI  BibTeX  RDF XOR-based hash function, conflict-free mapping, column space, skewed-associative cache, interbank dispersion, null space
57Joel L. Wolf, Philip S. Yu, John Turek, Daniel M. Dias A Parallel Hash Join Algorithm for Managing Data Skew. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 1993 DBLP  DOI  BibTeX  RDF parallel hash join algorithm, hierarchical hashing, heuristicoptimization, join column, scheduling, parallel algorithms, load balancing, query processing, resource allocation, relational databases, relational databases, combinatorial optimization, database theory, complex queries, data skew, hash joins, Zipf-like distribution
57Jonathan J. Hoch, Adi Shamir On the Strength of the Concatenated Hash Combiner When All the Hash Functions Are Weak. Search on Bibsonomy ICALP (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF cryptographic combiners, indifferentiability, hash functions
57Moses D. Liskov Constructing an Ideal Hash Function from Weak Ideal Compression Functions. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Merkle-Damgård, ideal primitives, non-streamable hash functions, zipper hash, Hash function, compression function
57Dingyi Han, Ting Shen, Shicong Meng, Yong Yu 0001 Cuckoo Ring: BalancingWorkload for Locality Sensitive Hash. Search on Bibsonomy Peer-to-Peer Computing The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Cuckoo Ring, Consistent Hash, Load Balance, Locality Sensitive Hash, Universal Hash
54Wenbin Luo, Gregory L. Heileman Exponential Hashing in Finite Fields. Search on Bibsonomy EUC (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
54Rina Panigrahy Entropy based nearest neighbor search in high dimensions. Search on Bibsonomy SODA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
53Zheng Gong, Xuejia Lai, Kefei Chen A synthetic indifferentiability analysis of some block-cipher-based hash functions. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF AMS Classifications 68W40, 68Q25
53Chris Huntley, Galina Antonova, Paul Guinand Effect of Hash Collisions on the Performance of LAN Switching Devices and Networks. Search on Bibsonomy LCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
53Dwaine E. Clarke, Srinivas Devadas, Marten van Dijk, Blaise Gassend, G. Edward Suh Incremental Multiset Hash Functions and Their Application to Memory Integrity Checking. Search on Bibsonomy ASIACRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
53Kenji Imasaki, Hong Nguyen, Sivarama P. Dandamudi Performance Comparison of Pipelined Hash Joins on Workstation Clusters. Search on Bibsonomy HiPC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
53Burton S. Kaliski Jr. On Hash Function Firewalls in Signature Schemes. Search on Bibsonomy CT-RSA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
53George Bebis, Michael Georgiopoulos, Niels da Vitoria Lobo Using self-organizing maps to learn geometric hash functions for model-based object recognition. Search on Bibsonomy IEEE Trans. Neural Networks The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
53Walter Hohl, Xuejia Lai, Thomas Meier 0001, Christian Waldvogel Security of Iterated Hash Functions Based on Block Ciphers. Search on Bibsonomy CRYPTO The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
53Shoji Miyaguchi, Kazuo Ohta, Masahiko Iwata Confirmation that Some Hash Functions Are Not Collision Free. Search on Bibsonomy EUROCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
52Denis Xavier Charles, Kristin E. Lauter, Eyal Z. Goren Cryptographic Hash Functions from Expander Graphs. Search on Bibsonomy J. Cryptol. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Supersingular elliptic curves, Elliptic curve cryptography, Expander graphs, Cryptographic hash functions, Ramanujan graphs, Isogenies
52Michael Henderson 0001, Bryce Cutt, Ramon Lawrence Exploiting join cardinality for faster hash joins. Search on Bibsonomy SAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF hybrid hash join, response time, cardinality, symmetric, PostgreSQL
52Praveen Gauravaram, Lars R. Knudsen On Randomizing Hash Functions to Strengthen the Security of Digital Signatures. Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Davies-Meyer, RMX, Digital signatures, Hash functions
52Christian Henke, Carsten Schmoll, Tanja Zseby Empirical evaluation of hash functions for multipoint measurements. Search on Bibsonomy Comput. Commun. Rev. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF multipoint measurements, packet selection, sampling, hash function, network measurement
52Kan Yasuda How to Fill Up Merkle-Damgård Hash Functions. Search on Bibsonomy ASIACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Merkle-Damgård, second-preimage resistance, one-wayness, hash function, padding
52Praveen Gauravaram, Katsuyuki Okeya Side Channel Analysis of Some Hash Based MACs: A Response to SHA-3 Requirements. Search on Bibsonomy ICICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF hash functions, side channel attacks, HMAC, Applied cryptography
52Tim Güneysu, Christof Paar, Sven Schäge Efficient Hash Collision Search Strategies on Special-Purpose Hardware. Search on Bibsonomy WEWoRC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Crypto Attacks, Hash functions, Special-purpose Hardware
52Florian Mendel, Vincent Rijmen Cryptanalysis of the Tiger Hash Function. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF pseudo-collision, pseudo-near-collision, Cryptanalysis, hash functions, collision, differential attack, near-collision
52Benno Stein 0001 Principles of hash-based text retrieval. Search on Bibsonomy SIGIR The full citation details ... 2007 DBLP  DOI  BibTeX  RDF hash-based similarity search, dimension reduction, locality-sensitive hashing
52Florian Mendel, Norbert Pramstaller, Christian Rechberger Improved Collision Attack on the Hash Function Proposed at PKC'98. Search on Bibsonomy ICISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF cryptanalysis, hash functions, collision, collision attack, differential attack, near-collision
52Khoongming Khoo, Swee-Huay Heng New Constructions of Universal Hash Functions Based on Function Sums. Search on Bibsonomy ICCSA (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF low maximal differential, low algebraic degree, substitution permutation network (SPN), Message authentication codes, universal hash functions
52Phillip G. Bradford, Olga V. Gavrylyako Foundations of Security for Hash Chains in Ad Hoc Networks. Search on Bibsonomy Clust. Comput. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF time-space lower bound, hash chains, k-wise independence
52Dimitris A. Karras, Vasilios Zorkadis A Novel Suite of Tests for Evaluating One-Way Hash Functions for Electronic Commerce Applications. Search on Bibsonomy EUROMICRO The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Cryptographic Mechanisms, One-way Hash Function Quality, Neural Networks, Authentication, Data Integrity, Electronic Commerce, Digital Signature, Security Protocols, Multilayer Perceptrons
52Yun Jiang, Akifumi Makinouchi A parallel hash-based join algorithm for a networked cluster of multiprocessor nodes. Search on Bibsonomy COMPSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF parallel hash-based join algorithm, multiprocessor nodes, distributed shared virtual space, message model, performance, design, parallel algorithms, parallel processing, shared-memory multiprocessor, distributed environments, high speed, low-cost, skew, ease of use, relational database systems, networked cluster
52Mark Etzel, Sarvar Patel, Zulfikar Ramzan SQUARE HASH: Fast Message Authenication via Optimized Universal Hash Functions. Search on Bibsonomy CRYPTO The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Message authentication codes, Universal Hashing
52Sebastiaan Indesteege, Bart Preneel Collisions for RC4-Hash. Search on Bibsonomy ISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF RC4-Hash, multicollisions, hash functions, collisions
52Swee-Huay Heng, Kaoru Kurosawa Square Hash with a Small Key Size. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF square hash, Message authentication codes, universal hash
51Sailesh Kumar, Patrick Crowley Segmented hash: an efficient hash table implementation for high performance networking subsystems. Search on Bibsonomy ANCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF hash table, lookup
48Xiaofeng Chen 0001, Fangguo Zhang, Willy Susilo, Yi Mu 0001 Efficient Generic On-Line/Off-Line Signatures Without Key Exposure. Search on Bibsonomy ACNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF On-line/off-line signatures, Key exposure, Chameleon hashing
48YoungGyo Lee, In-Jung Kim, Seungjoo Kim, Dongho Won A Method for Detecting the Exposure of OCSP Responder's Session Private Key in D-OCSP-KIS. Search on Bibsonomy EuroPKI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF D-OCSP, D-OCSP-KIS, OCSP Responder, hash function
48Michel Hanna, Socrates Demetriades, Sangyeun Cho, Rami G. Melhem CHAP: Enabling Efficient Hardware-Based Multiple Hash Schemes for IP Lookup. Search on Bibsonomy Networking The full citation details ... 2009 DBLP  DOI  BibTeX  RDF hardware multiple hashing, content-based probing, IP lookup
48Anja Lehmann, Stefano Tessaro A Modular Design for Hash Functions: Towards Making the Mix-Compress-Mix Approach Practical. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
48Przemyslaw Rodwald, Janusz Stoklosa Family of Parameterized Hash Algorithms. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
48Haojun Zhang, Xiaoxue Li, Rui Ren A Novel Self-Renewal Hash Chain and Its Implementation. Search on Bibsonomy EUC (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
48Emmanuel Bresson, Benoît Chevallier-Mames, Christophe Clavier, Aline Gouget, Pascal Paillier, Thomas Peyrin How to Use Merkle-Damgård - On the Security Relations between Signature Schemes and Their Inner Hash Functions. Search on Bibsonomy ProvSec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
48Susan G. Barwick, Wen-Ai Jackson A sequence approach to linear perfect hash families. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF AMS Classification 11T71
48Ye Xia 0001, Shigang Chen, Vivekanand Korgaonkar Load Balancing with Multiple Hash Functions in Peer-to-Peer Networks. Search on Bibsonomy ICPADS (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
48John Kelsey, Tadayoshi Kohno Herding Hash Functions and the Nostradamus Attack. Search on Bibsonomy EUROCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
48Claus Vielhauer, Ralf Steinmetz, Astrid Mayerhöfer Biometric Hash based on Statistical Features of Online Signatures. Search on Bibsonomy ICPR (1) The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
48Lars R. Knudsen, Bart Preneel Hash Functions Based on Block Ciphers and Quaternary Codes. Search on Bibsonomy ASIACRYPT The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
48Mihir Bellare, Ran Canetti, Hugo Krawczyk Keying Hash Functions for Message Authentication. Search on Bibsonomy CRYPTO The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
48Hui-I Hsiao, Ming-Syan Chen, Philip S. Yu On Parallel Execution of Multiple Pipelined Hash Joins. Search on Bibsonomy SIGMOD Conference The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
48Alfredo De Santis, Moti Yung On the Design of Provably Secure Cryptographic Hash Functions. Search on Bibsonomy EUROCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
47Martin Dietzfelbinger, Torben Hagerup Simple Minimal Perfect Hashing in Less Space. Search on Bibsonomy ESA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF minimal perfect hash functions, space requirements, Data structures, randomized algorithms, hashing, dictionaries, hash tables
47Jovan Dj. Golic Modes of Operation of Stream Ciphers. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2000 DBLP  DOI  BibTeX  RDF keyed hash functions, security, Stream ciphers, block ciphers, hash functions, conversions
47Mustafa Safdari Evolving universal hash functions using genetic algorithms. Search on Bibsonomy GECCO (Companion) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF genetic algorithms, key distribution, universal hash functions
47Charalampos Papamanthou, Roberto Tamassia, Nikos Triandopoulos Authenticated hash tables. Search on Bibsonomy CCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF rsa accumulator, verification, authentication, hash tables
47Michael Gorski, Stefan Lucks, Thomas Peyrin Slide Attacks on a Class of Hash Functions. Search on Bibsonomy ASIACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Grindahl, RadioGatún, sponge function, MAC, hash function, slide attacks
47Mihir Bellare, Thomas Ristenpart Multi-Property-Preserving Hash Domain Extension and the EMD Transform. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Merkle-Damgård, Hash functions, random oracle, pseudorandom function, collision-resistance
47César Estébanez, Julio César Hernández Castro, Arturo Ribagorda, Pedro Isasi Evolving hash functions by means of genetic programming. Search on Bibsonomy GECCO The full citation details ... 2006 DBLP  DOI  BibTeX  RDF avalanche effect, genetic programming, hash functions
47Deukjo Hong, Donghoon Chang, Jaechul Sung, Sangjin Lee 0002, Seokhie Hong, Jaesang Lee 0002, Dukjae Moon, Sungtaek Chee A New Dedicated 256-Bit Hash Function: FORK-256. Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF 256-bit Hash Function, FORK-256
47Martin Stanek Analysis of Fast Blockcipher-Based Hash Functions. Search on Bibsonomy ICCSA (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Hash functions, provable security, black-box model
47Stefan Lucks A Failure-Friendly Design Principle for Hash Functions. Search on Bibsonomy ASIACRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF multi-collision, failure- friendliness, hash function, provable security
47Phillip Rogaway, Thomas Shrimpton Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance. Search on Bibsonomy FSE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF preimage resistance, second-preimage resistance, provable security, cryptographic hash functions, collision resistance
47Yaron Sella On The Computation-Storage Trade-Offs of Hash Chain Traversal. Search on Bibsonomy Financial Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF hash chain traversal, optimality, pebbles, Amortization
47Junko Nakajima, Mitsuru Matsui Performance Analysis and Parallel Implementation of Dedicated Hash Functions. Search on Bibsonomy EUROCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF dedicated hash functions, Pentium III, parallel implementations
47Elena Andreeva 0001, Charles Bouillaguet, Orr Dunkelman, John Kelsey Herding, Second Preimage and Trojan Message Attacks beyond Merkle-Damgård. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Herding attack, Trojan message attack, Zipper hash, Concatenated hash, Tree hash, Second preimage attack
46John Black, Martin Cochran, Thomas Shrimpton On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions. Search on Bibsonomy J. Cryptol. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Blockcipher-based hash functions, Provable security, Ideal-cipher model, Tweakable blockciphers, Collision-resistant hash functions
46Mohammad Reza Reyhanitabar, Shuhong Wang, Reihaneh Safavi-Naini Non-interactive Manual Channel Message Authentication Based on eTCR Hash Functions. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF manual channel, eTCR hash family, randomized hashing, hash function security, Message authentication
46William E. Burr Cryptographic Hash Standards: Where Do We Go from Here? Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF hash function attack, cryptography, hash function, SHA-1, NIST
46Kemal Bicakci, Nazife Baykal Infinite Length Hash Chains and Their Applications. Search on Bibsonomy WETICE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF authentication, network security, electronic commerce, digital signatures, hash functions, hash chains
43Shlomi Dolev, Limor Lahiani, Yinnon A. Haviv Brief Announcement: Unique Permutation Hashing. Search on Bibsonomy SSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 7013 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license