The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase hash-functions (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1977-1984 (15) 1985-1989 (16) 1990-1991 (24) 1992 (19) 1993 (16) 1994 (16) 1995-1996 (19) 1997 (19) 1998-1999 (32) 2000 (15) 2001 (24) 2002 (34) 2003 (38) 2004 (67) 2005 (95) 2006 (130) 2007 (119) 2008 (131) 2009 (116) 2010 (56) 2011 (41) 2012 (45) 2013 (42) 2014 (30) 2015 (34) 2016 (45) 2017 (34) 2018 (33) 2019 (33) 2020 (31) 2021 (25) 2022 (49) 2023 (38) 2024 (7)
Publication types (Num. hits)
article(513) book(1) incollection(19) inproceedings(930) phdthesis(25)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 877 occurrences of 391 keywords

Results
Found 1488 publication records. Showing 1488 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
137Jonathan J. Hoch, Adi Shamir Breaking the ICE - Finding Multicollisions in Iterated Concatenated and Expanded (ICE) Hash Functions. Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF iterated hash functions, tree based hash functions, multicollisions, cryptanalysis, Hash functions
109Lars R. Knudsen, Xuejia Lai, Bart Preneel Attacks on Fast Double Block Length Hash Functions. Search on Bibsonomy J. Cryptol. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Cryptanalysis, Cryptanalysis, Block ciphers, Block ciphers, Key words, Cryptographic hash functions, Cryptographic hash functions, Birthday attacks, Birthday attacks, Double block length hash functions, Double block length hash functions
99Ahto Buldas, Sven Laur Do Broken Hash Functions Affect the Security of Time-Stamping Schemes? Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
97James Aspnes, Muli Safra, Yitong Yin Ranged hash functions and the price of churn. Search on Bibsonomy SODA The full citation details ... 2008 DBLP  BibTeX  RDF
93Martin Dietzfelbinger, Joseph Gil, Yossi Matias, Nicholas Pippenger Polynomial Hash Functions Are Reliable (Extended Abstract). Search on Bibsonomy ICALP The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
92Norbert Pramstaller, Mario Lamberger, Vincent Rijmen Second Preimages for Iterated Hash Functions and Their Implications on MACs. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF iterated hash functions, block-cipher based hash functions, differential cryptanalysis, second preimage, double block-length hash functions
91Donghoon Chang, Kishan Chand Gupta, Mridul Nandi RC4-Hash: A New Hash Function Based on RC4. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Hash Function, Collision Attack, RC4, Preimage Attack
90Phillip G. Bradford, Olga V. Gavrylyako Hash Chains with Diminishing Ranges for Sensors. Search on Bibsonomy ICPP Workshops The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
77Michael Mitzenmacher, Salil P. Vadhan Why simple hash functions work: exploiting the entropy in a data stream. Search on Bibsonomy SODA The full citation details ... 2008 DBLP  BibTeX  RDF
77Ahto Buldas, Aivo Jürgenson Does Secure Time-Stamping Imply Collision-Free Hash Functions? Search on Bibsonomy ProvSec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
74Jonathan J. Hoch, Adi Shamir On the Strength of the Concatenated Hash Combiner When All the Hash Functions Are Weak. Search on Bibsonomy ICALP (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF cryptographic combiners, indifferentiability, hash functions
71Khoongming Khoo, Swee-Huay Heng New Constructions of Universal Hash Functions Based on Function Sums. Search on Bibsonomy ICCSA (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF low maximal differential, low algebraic degree, substitution permutation network (SPN), Message authentication codes, universal hash functions
71Jovan Dj. Golic Modes of Operation of Stream Ciphers. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2000 DBLP  DOI  BibTeX  RDF keyed hash functions, security, Stream ciphers, block ciphers, hash functions, conversions
70Qiming Li, Sujoy Roy On the security of non-forgeable robust hash functions. Search on Bibsonomy ICIP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
70Zheng Gong, Xuejia Lai, Kefei Chen A synthetic indifferentiability analysis of some block-cipher-based hash functions. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF AMS Classifications 68W40, 68Q25
70Donghoon Chang, Wonil Lee, Seokhie Hong, Jaechul Sung, Sangjin Lee 0002, Soo Hak Sung Impossibility of Construction of OWHF and UOWHF from PGV Model Based on Block Cipher Secure Against ACPCA. Search on Bibsonomy INDOCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
70Denis Xavier Charles, Kristin E. Lauter, Eyal Z. Goren Cryptographic Hash Functions from Expander Graphs. Search on Bibsonomy J. Cryptol. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Supersingular elliptic curves, Elliptic curve cryptography, Expander graphs, Cryptographic hash functions, Ramanujan graphs, Isogenies
68Dwaine E. Clarke, Srinivas Devadas, Marten van Dijk, Blaise Gassend, G. Edward Suh Incremental Multiset Hash Functions and Their Application to Memory Integrity Checking. Search on Bibsonomy ASIACRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
68Praveen Gauravaram, Lars R. Knudsen On Randomizing Hash Functions to Strengthen the Security of Digital Signatures. Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Davies-Meyer, RMX, Digital signatures, Hash functions
68Martin Stanek Analysis of Fast Blockcipher-Based Hash Functions. Search on Bibsonomy ICCSA (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Hash functions, provable security, black-box model
68Junko Nakajima, Mitsuru Matsui Performance Analysis and Parallel Implementation of Dedicated Hash Functions. Search on Bibsonomy EUROCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF dedicated hash functions, Pentium III, parallel implementations
68Florian Mendel, Norbert Pramstaller, Christian Rechberger A (Second) Preimage Attack on the GOST Hash Function. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF cryptanalysis, hash functions, preimage attack
67Mark Etzel, Sarvar Patel, Zulfikar Ramzan SQUARE HASH: Fast Message Authenication via Optimized Universal Hash Functions. Search on Bibsonomy CRYPTO The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Message authentication codes, Universal Hashing
66Walter Hohl, Xuejia Lai, Thomas Meier 0001, Christian Waldvogel Security of Iterated Hash Functions Based on Block Ciphers. Search on Bibsonomy CRYPTO The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
66Mustafa Safdari Evolving universal hash functions using genetic algorithms. Search on Bibsonomy GECCO (Companion) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF genetic algorithms, key distribution, universal hash functions
65Shoji Miyaguchi, Kazuo Ohta, Masahiko Iwata Confirmation that Some Hash Functions Are Not Collision Free. Search on Bibsonomy EUROCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
64César Estébanez, Julio César Hernández Castro, Arturo Ribagorda, Pedro Isasi Evolving hash functions by means of genetic programming. Search on Bibsonomy GECCO The full citation details ... 2006 DBLP  DOI  BibTeX  RDF avalanche effect, genetic programming, hash functions
63Alfredo De Santis, Moti Yung On the Design of Provably Secure Cryptographic Hash Functions. Search on Bibsonomy EUROCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
63Takahiro Matsuda 0002, Nuttapong Attrapadung, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function. Search on Bibsonomy ProvSec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF target collision resistant hash function, digital signature, standard model, strong unforgeability
61Hans Vandierendonck, Koenraad De Bosschere XOR-Based Hash Functions. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2005 DBLP  DOI  BibTeX  RDF XOR-based hash function, conflict-free mapping, column space, skewed-associative cache, interbank dispersion, null space
61Lars R. Knudsen, Bart Preneel Hash Functions Based on Block Ciphers and Quaternary Codes. Search on Bibsonomy ASIACRYPT The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
61Wenbin Luo, Gregory L. Heileman Exponential Hashing in Finite Fields. Search on Bibsonomy EUC (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
61Sang-Uk Shin, Kyung Hyune Rhee, DaeHyun Ryu, Sangjin Lee A New Hash Function Based on MDx-Family and Its Application to MAC. Search on Bibsonomy Public Key Cryptography The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
60Thomas Peyrin, Henri Gilbert, Frédéric Muller, Matthew J. B. Robshaw Combining Compression Functions and Block Cipher-Based Hash Functions. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF block ciphers, hash functions, compression functions
59John Kelsey, Tadayoshi Kohno Herding Hash Functions and the Nostradamus Attack. Search on Bibsonomy EUROCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
59Mitsuhiro Hattori, Shoichi Hirose, Susumu Yoshida Analysis of Double Block Length Hash Functions. Search on Bibsonomy IMACC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
59Xuejia Lai, James L. Massey Hash Function Based on Block Ciphers. Search on Bibsonomy EUROCRYPT The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
59Daniel R. Simon Finding Collisions on a One-Way Street: Can Secure Hash Functions Be Based on General Assumptions? Search on Bibsonomy EUROCRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF cryptography, Hash functions, oracle, complexity theory
59Tim Güneysu, Christof Paar, Sven Schäge Efficient Hash Collision Search Strategies on Special-Purpose Hardware. Search on Bibsonomy WEWoRC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Crypto Attacks, Hash functions, Special-purpose Hardware
57Yuliang Zheng 0001, Tsutomu Matsumoto, Hideki Imai Structural Properties of One-way Hash Functions. Search on Bibsonomy CRYPTO The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
57Rina Panigrahy Entropy based nearest neighbor search in high dimensions. Search on Bibsonomy SODA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
56Emmanuel Bresson, Benoît Chevallier-Mames, Christophe Clavier, Aline Gouget, Pascal Paillier, Thomas Peyrin How to Use Merkle-Damgård - On the Security Relations between Signature Schemes and Their Inner Hash Functions. Search on Bibsonomy ProvSec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
56Ye Xia 0001, Shigang Chen, Vivekanand Korgaonkar Load Balancing with Multiple Hash Functions in Peer-to-Peer Networks. Search on Bibsonomy ICPADS (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
56Kan Yasuda How to Fill Up Merkle-Damgård Hash Functions. Search on Bibsonomy ASIACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Merkle-Damgård, second-preimage resistance, one-wayness, hash function, padding
56Ilya Mironov Collision-Resistant No More: Hash-and-Sign Paradigm Revisited. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF TCR, UOWHF, Cramer-Shoup, PSS-RSA, signatures, DSA, collision-resistance
55John Black, Martin Cochran, Thomas Shrimpton On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions. Search on Bibsonomy EUROCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF provable security, tweakable blockciphers, Collision-resistant hash functions
55Mario Lamberger, Florian Mendel Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Blender, DCH, Hash functions, collision attacks, preimage attacks, SHA-3
54Anja Lehmann, Stefano Tessaro A Modular Design for Hash Functions: Towards Making the Mix-Compress-Mix Approach Practical. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
54Mihir Bellare, Ran Canetti, Hugo Krawczyk Keying Hash Functions for Message Authentication. Search on Bibsonomy CRYPTO The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
54Donghoon Chang, Sangjin Lee 0002, Mridul Nandi, Moti Yung Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
54Dimitris A. Karras, Vasilios Zorkadis A Novel Suite of Tests for Evaluating One-Way Hash Functions for Electronic Commerce Applications. Search on Bibsonomy EUROMICRO The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Cryptographic Mechanisms, One-way Hash Function Quality, Neural Networks, Authentication, Data Integrity, Electronic Commerce, Digital Signature, Security Protocols, Multilayer Perceptrons
54Marc Girault Hash-Functions Using Modulo-N Operations. Search on Bibsonomy EUROCRYPT The full citation details ... 1987 DBLP  DOI  BibTeX  RDF
53Lars R. Knudsen, Christian Rechberger, Søren S. Thomsen The Grindahl Hash Functions. Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF hash functions, AES, Rijndael, proposal, design strategy
53Daniel Joscák, Jirí Tuma Multi-block Collisions in Hash Functions Based on 3C and 3C+ Enhancements of the Merkle-Damgård Construction. Search on Bibsonomy ICISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF multi-block collision attack, 3C and 3C+ constructions, hash functions
53Florian Mendel, Norbert Pramstaller, Christian Rechberger Improved Collision Attack on the Hash Function Proposed at PKC'98. Search on Bibsonomy ICISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF cryptanalysis, hash functions, collision, collision attack, differential attack, near-collision
52Mihir Bellare, Thomas Ristenpart Hash Functions in the Dedicated-Key Setting: Design Choices and MPP Transforms. Search on Bibsonomy ICALP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
52William Aiello, Stuart Haber, Ramarathnam Venkatesan New Constructions for Secure Hash Functions. Search on Bibsonomy FSE The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
52Atefeh Mashatan, Douglas R. Stinson Interactive two-channel message authentication based on Interactive-Collision Resistant hash functions. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Two-channel cryptography, Authenticated channel, Hash functions, Message authentication
52Christian Rechberger, Vincent Rijmen, Nicolas Sklavos 0001 The NIST Cryptographic Workshop on Hash Functions. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security, cryptanalysis, hash functions, SHA-1
52Tor Helleseth, Thomas Johansson 0001 Universal Hash Functions from Exponential Sums over Finite Fields and Galois Rings. Search on Bibsonomy CRYPTO The full citation details ... 1996 DBLP  DOI  BibTeX  RDF exponential sums, Galois rings, authentication codes, Universal hash functions
51Lars R. Knudsen, Xuejia Lai New Attacks on all Double Block Length Hash Functions of Hash Rate 1, including the Parallel-DM. Search on Bibsonomy EUROCRYPT The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
50Christian Henke, Carsten Schmoll, Tanja Zseby Empirical evaluation of hash functions for multipoint measurements. Search on Bibsonomy Comput. Commun. Rev. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF multipoint measurements, packet selection, sampling, hash function, network measurement
50Deukjo Hong, Bart Preneel, Sangjin Lee 0002 Higher Order Universal One-Way Hash Functions. Search on Bibsonomy ASIACRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Collision Resistant Hash Function (CRHF), Universal One-Way Hash Function (UOWHF), Higher Order Universal One-Way Hash Function, Hash Function
50Norbert Pramstaller, Christian Rechberger, Vincent Rijmen Impact of Rotations in SHA-1 and Related Hash Functions. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
50Judy Goldsmith, Lane A. Hemachandra, Kenneth Kunen On the Structure and Complexity of Infinite Sets with Minimal Perfect Hash Functions. Search on Bibsonomy FSTTCS The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
50Phillip Rogaway, Thomas Shrimpton Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance. Search on Bibsonomy FSE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF preimage resistance, second-preimage resistance, provable security, cryptographic hash functions, collision resistance
50Thomas Johansson 0001 Bucket Hashing with a Small Key Size. Search on Bibsonomy EUROCRYPT The full citation details ... 1997 DBLP  DOI  BibTeX  RDF bucket hashing, message authentication, software implementations, authentication codes, Universal hash functions
50John Black, Martin Cochran, Thomas Shrimpton On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions. Search on Bibsonomy J. Cryptol. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Blockcipher-based hash functions, Provable security, Ideal-cipher model, Tweakable blockciphers, Collision-resistant hash functions
49Marina Blanton, Mikhail J. Atallah Provable bounds for portable and flexible privacy-preserving access. Search on Bibsonomy SACMAT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF compact policy representation, minimal perfect hash functions, order-preserving minimal perfect hash functions, portable access rights, algorithm analysis
49Olivier Billet, Matthew J. B. Robshaw, Thomas Peyrin On Building Hash Functions from Multivariate Quadratic Equations. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
49Xiaoyun Wang 0001, Xuejia Lai, Dengguo Feng, Hui Chen, Xiuyuan Yu Cryptanalysis of the Hash Functions MD4 and RIPEMD. Search on Bibsonomy EUROCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
49Josef Scharinger A Systems Theoretic Approach to the Design of Scalable Cryptographic Hash Functions. Search on Bibsonomy EUROCAST The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
48Noga Alon, Shai Gutner Balanced Families of Perfect Hash Functions and Their Applications. Search on Bibsonomy ICALP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF approximate counting of subgraphs, perfect hashing, color-coding
48Dmitry Khovratovich Cryptanalysis of Hash Functions with Structures. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF truncated differentials, Grindahl, Fugue, cryptanalysis, hash functions, structures, SHA-3
48Antoine Joux, Thomas Peyrin Hash Functions and the (Amplified) Boomerang Attack. Search on Bibsonomy CRYPTO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF hash functions, SHA-1, boomerang attack
48Mihir Bellare, Thomas Ristenpart Multi-Property-Preserving Hash Domain Extension and the EMD Transform. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Merkle-Damgård, Hash functions, random oracle, pseudorandom function, collision-resistance
48Martin Dietzfelbinger, Torben Hagerup Simple Minimal Perfect Hashing in Less Space. Search on Bibsonomy ESA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF minimal perfect hash functions, space requirements, Data structures, randomized algorithms, hashing, dictionaries, hash tables
47Michael Gorski, Stefan Lucks, Thomas Peyrin Slide Attacks on a Class of Hash Functions. Search on Bibsonomy ASIACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Grindahl, RadioGatún, sponge function, MAC, hash function, slide attacks
47Mridul Nandi, Douglas R. Stinson Multicollision Attacks on Some Generalized Sequential Hash Functions. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
47Martin Feldhofer, Christian Rechberger A Case Against Currently Used Hash Functions in RFID Protocols. Search on Bibsonomy OTM Workshops (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
47Bo Yang 0010, Ramesh Karri, David A. McGrew Divide-and-concatenate: an architecture-level optimization technique for universal hash functions. Search on Bibsonomy IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
47Shoichi Hirose Secure Block Ciphers Are Not Sufficient for One-Way Hash Functions in the Preneel-Govaerts-Vandewalle Model. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
46Florian Mendel, Martin Schläffer Collisions for Round-Reduced LAKE. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF cryptanalysis, hash functions, collision attack
46Antoon Bosselaers, René Govaerts, Joos Vandewalle Fast Hashing on the Pentium. Search on Bibsonomy CRYPTO The full citation details ... 1996 DBLP  DOI  BibTeX  RDF Pentium processor, Parallel implementation, Software performance, Cryptographic hash functions
45Yevgeniy Dodis, Prashant Puniya Getting the Best Out of Existing Hash Functions; or What if We Are Stuck with SHA?. Search on Bibsonomy ACNS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
45Ahto Buldas, Margus Niitsoo Can We Construct Unbounded Time-Stamping Schemes from Collision-Free Hash Functions?. Search on Bibsonomy ProvSec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
45Andrey Bogdanov, Gregor Leander, Christof Paar, Axel Poschmann, Matthew J. B. Robshaw, Yannick Seurin Hash Functions and RFID Tags: Mind the Gap. Search on Bibsonomy CHES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
45Jean-Philippe Aumasson, Raphael C.-W. Phan How (Not) to Efficiently Dither Blockcipher-Based Hash Functions?. Search on Bibsonomy AFRICACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
45Ibrahim Cem Baykal, Graham A. Jullien On the Use of Hash Functions as Preprocessing Algorithms to Detect Defects on Repeating Definite Textures. Search on Bibsonomy Mach. Vis. Appl. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF In-camera, FPGA, Real-time, Segmentation, Defect detection, Camera network
45Ibrahim Cem Baykal, Roberto Muscedere, Graham A. Jullien On the use of hash functions for defect detection in textures for in-camera web inspection systems. Search on Bibsonomy ISCAS (5) The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
45Florian Mendel, Norbert Pramstaller, Christian Rechberger, Marcin Kontak, Janusz Szmidt Cryptanalysis of the GOST Hash Function. Search on Bibsonomy CRYPTO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF cryptanalysis, hash function, collision attack, preimage attack, second preimage attack
45Chris Huntley, Galina Antonova, Paul Guinand Effect of Hash Collisions on the Performance of LAN Switching Devices and Networks. Search on Bibsonomy LCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
45Jesang Lee, Seokhie Hong, Jaechul Sung, Haeryong Park A New Double-Block-Length Hash Function Using Feistel Structure. Search on Bibsonomy ISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Block Ciphers, Hash Function, Double Block Length Hash Function
43Rishiraj Bhattacharyya, Avradip Mandal, Mridul Nandi Indifferentiability Characterization of Hash Functions and Optimal Bounds of Popular Domain Extensions. Search on Bibsonomy INDOCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Indifferentiability, Merkle-Damgård, HAIFA, Tree mode of operations with counter
43Harald Widiger, Ralf Salomon, Dirk Timmermann Packet Classification with Evolvable Hardware Hash Functions - An Intrinsic Approach. Search on Bibsonomy BioADIT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
43Stefan Lucks A Failure-Friendly Design Principle for Hash Functions. Search on Bibsonomy ASIACRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF multi-collision, failure- friendliness, hash function, provable security
43Bart Preneel The State of Hash Functions and the NIST SHA-3 Competition. Search on Bibsonomy Inscrypt The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
43Mridul Nandi Towards Optimal Double-Length Hash Functions. Search on Bibsonomy INDOCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
43Ilya Mironov Hash Functions: From Merkle-Damgård to Shoup. Search on Bibsonomy EUROCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
43Curd Engelmann, Jörg Keller 0001 Simulation-based Comparison of Hash Functions for Emulated Shared Memory. Search on Bibsonomy PARLE The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 1488 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license