The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Hash with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1968-1973 (17) 1974-1977 (20) 1978-1980 (18) 1981-1982 (16) 1983-1984 (19) 1985 (16) 1986-1987 (16) 1988-1989 (33) 1990 (33) 1991 (27) 1992 (38) 1993 (28) 1994 (44) 1995 (33) 1996 (36) 1997 (47) 1998 (42) 1999 (62) 2000 (56) 2001 (85) 2002 (139) 2003 (183) 2004 (329) 2005 (415) 2006 (468) 2007 (493) 2008 (494) 2009 (456) 2010 (240) 2011 (205) 2012 (223) 2013 (226) 2014 (182) 2015 (188) 2016 (241) 2017 (229) 2018 (227) 2019 (260) 2020 (232) 2021 (255) 2022 (304) 2023 (278) 2024 (60)
Publication types (Num. hits)
article(2517) book(3) incollection(69) inproceedings(4361) phdthesis(63)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 3717 occurrences of 1502 keywords

Results
Found 7025 publication records. Showing 7013 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
43Sailesh Kumar, Jonathan S. Turner, Patrick Crowley Peacock Hashing: Deterministic and Updatable Hashing for High Performance Networking. Search on Bibsonomy INFOCOM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
42Mario Lamberger, Florian Mendel Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Blender, DCH, Hash functions, collision attacks, preimage attacks, SHA-3
42Zhewei Wei, Ke Yi 0001, Qin Zhang 0001 Dynamic external hashing: the limit of buffering. Search on Bibsonomy SPAA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF dynamic hash table, successful query, lower bound
42Kimmo Halunen, Pauli Rikula, Juha Röning On the Security of VSH in Password Schemes. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF VSH, hash function, preimage attack, password security
42Martin Dietzfelbinger, Ulf Schellbach On risks of using cuckoo hashing with simple universal hash classes. Search on Bibsonomy SODA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
42Heeyeol Yu, Rabi N. Mahapatra, Laxmi N. Bhuyan A Hash-based Scalable IP lookup using Bloom and Fingerprint Filters. Search on Bibsonomy ICNP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
42Weiming Li, Bin Ma 0002, Kaizhong Zhang Amino Acid Classification and Hash Seeds for Homology Search. Search on Bibsonomy BICoB The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
42Xiantao Zhang, Anthony X. F. Xu, Qi Li 0002, David K. Y. Yau, Sihan Qing, Huanguo Zhang A hash-TLB approach for MMU virtualization in xen/IA64. Search on Bibsonomy IPDPS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
42Donghoon Chang, Mridul Nandi Improved Indifferentiability Security Analysis of chopMD Hash Function. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
42Olivier Billet, Matthew J. B. Robshaw, Thomas Peyrin On Building Hash Functions from Multivariate Quadratic Equations. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
42Donghoon Chang, Sangjin Lee 0002, Mridul Nandi, Moti Yung Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
42Xiaoyun Wang 0001, Xuejia Lai, Dengguo Feng, Hui Chen, Xiuyuan Yu Cryptanalysis of the Hash Functions MD4 and RIPEMD. Search on Bibsonomy EUROCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
42Esam Khan, M. Watheq El-Kharashi, Fayez Gebali, Mostafa I. H. Abd-El-Barr An FPGA Design of a Unified Hash Engine for IPSec Authentication. Search on Bibsonomy IWSOC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
42Mihir Bellare, Tadayoshi Kohno Hash Function Balance and Its Impact on Birthday Attacks. Search on Bibsonomy EUROCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
42Xi Zhang, Tahsin M. Kurç, Tony Pan, Ümit V. Çatalyürek, Sivaramakrishnan Narayanan, Pete Wyckoff, Joel H. Saltz Strategies for Using Additional Resources in Parallel Hash-Based Join Algorithms. Search on Bibsonomy HPDC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
42Frank Olken, Doron Rotem, Ping Xu Random Sampling from Hash Files. Search on Bibsonomy SIGMOD Conference The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
42Yuliang Zheng 0001, Tsutomu Matsumoto, Hideki Imai Structural Properties of One-way Hash Functions. Search on Bibsonomy CRYPTO The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
42Marc Girault Hash-Functions Using Modulo-N Operations. Search on Bibsonomy EUROCRYPT The full citation details ... 1987 DBLP  DOI  BibTeX  RDF
42Mridul Nandi Characterizing Padding Rules of MD Hash Functions Preserving Collision Security. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF MD hash function, padding rule, suffix-free, collision resistant
42Yong Ki Lee, Herwin Chan, Ingrid Verbauwhede Design Methodology for Throughput Optimum Architectures of Hash Algorithms of the MD4-class. Search on Bibsonomy J. Signal Process. Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Architecture design methodology, MD4-based hash algorithm, SHA1, RIPEMD-160, Iteration bound analysis, DFG (Data Flow Graph) transformation, Throughput optimization, MD5
42Elena Andreeva 0001, Charles Bouillaguet, Pierre-Alain Fouque, Jonathan J. Hoch, John Kelsey, Adi Shamir, Sébastien Zimmer Second Preimage Attacks on Dithered Hash Functions. Search on Bibsonomy EUROCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Cryptanalysis, Hash Function, Dithering
42Shimin Chen, Anastassia Ailamaki, Phillip B. Gibbons, Todd C. Mowry Improving hash join performance through prefetching. Search on Bibsonomy ACM Trans. Database Syst. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF CPU cache performance, CPU cache prefetching, group prefetching, software-pipelined prefetching, Hash join
42Athanasios Kakarountas, Haralambos Michail, Athanasios Milidonis, Costas E. Goutis, George Theodoridis High-Speed FPGA Implementation of Secure Hash Algorithm for IPSec and VPN Applications. Search on Bibsonomy J. Supercomput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF high-speed performance, Security, FPGA, hash function, hardware implementation
42Norbert Pramstaller, Christian Rechberger, Vincent Rijmen A compact FPGA implementation of the hash function whirlpool. Search on Bibsonomy FPGA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF compact hardware implementation, FPGA, hash function, whirlpool
42Jean-Christophe Filliâtre, Sylvain Conchon Type-safe modular hash-consing. Search on Bibsonomy ML The full citation details ... 2006 DBLP  DOI  BibTeX  RDF hash-consing, data structures, sharing
42Jahangir Hasan, Srihari Cadambi, Venkata Jakkula, Srimat T. Chakradhar Chisel: A Storage-efficient, Collision-free Hash-based Network Processing Architecture. Search on Bibsonomy ISCA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Bloom Filters, Packet Classification, Hash Tables, IP Lookup, Longest Prefix Matching
42Norbert Pramstaller, Christian Rechberger, Vincent Rijmen Breaking a New Hash Function Design Strategy Called SMASH. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF SMASH, cryptanalysis, hash functions, collision
42John Black, Martin Cochran, Thomas Shrimpton On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions. Search on Bibsonomy EUROCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF provable security, tweakable blockciphers, Collision-resistant hash functions
42Ram D. Gopal, Ram Ramesh, Stanley Zionts Criss-Cross Hash Joins: Design and Analysis. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF relational architecture, Database, query processing, hash, index, join
42Palash Sarkar 0001, Paul J. Schellenberg A Parallel Algorithm for Extending Cryptographic Hash Functions. Search on Bibsonomy INDOCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Merkle-Damgard construction, parallel algorithm, cryptographic hash function, collision resistance
42Bok-Min Goi, M. U. Siddiqi, Hean-Teik Chuah Incremental Hash Function Based on Pair Chaining & Modular Arithmetic Combining. Search on Bibsonomy INDOCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Incremental Cryptography, Cryptography, Hash Function
42Sung-Ming Yen, Yuliang Zheng 0001 Weighted One-Way Hash Chain and Its Applications. Search on Bibsonomy ISW The full citation details ... 2000 DBLP  DOI  BibTeX  RDF One-way hash chain, Portable computing device, Cryptography, Electronic commerce, Micropayment
42Rosario Gennaro, Shai Halevi, Tal Rabin Secure Hash-and-Sign Signatures Without the Random Oracle. Search on Bibsonomy EUROCRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Hash and Sign, Smooth Numbers, Digital Signatures, RSA, Random Oracle, Chameleon Hashing
42Daniel R. Simon Finding Collisions on a One-Way Street: Can Secure Hash Functions Be Based on General Assumptions? Search on Bibsonomy EUROCRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF cryptography, Hash functions, oracle, complexity theory
41Lars R. Knudsen, Xuejia Lai New Attacks on all Double Block Length Hash Functions of Hash Rate 1, including the Parallel-DM. Search on Bibsonomy EUROCRYPT The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
41Luigi Dadda, Marco Macchetti, Jeff Owen An ASIC design for a high speed implementation of the hash function SHA-256 (384, 512). Search on Bibsonomy ACM Great Lakes Symposium on VLSI The full citation details ... 2004 DBLP  DOI  BibTeX  RDF secure hash standard, hash function, data authentication
38Rasmus Pagh, Zhewei Wei, Ke Yi 0001, Qin Zhang 0001 Cache-oblivious hashing. Search on Bibsonomy PODS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF hashing, cache-oblivious algorithms
38Bo Yang 0010, Ramesh Karri, David A. McGrew A High-Speed Hardware Architecture for Universal Message Authentication Code. Search on Bibsonomy IEEE J. Sel. Areas Commun. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
38Baris Coskun, Bülent Sankur, Nasir D. Memon Spatio-Temporal Transform Based Video Hashing. Search on Bibsonomy IEEE Trans. Multim. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
38Peter C. Dillinger, Panagiotis Manolios Fast and Accurate Bitstate Verification for SPIN. Search on Bibsonomy SPIN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
38Wonil Lee, Mridul Nandi, Palash Sarkar 0001, Donghoon Chang, Sangjin Lee 0002, Kouichi Sakurai Pseudorandomness of SPN-Type Transformations. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
37Rei Odaira, Kazunori Ogata, Kiyokuni Kawachiya, Tamiya Onodera, Toshio Nakatani Efficient runtime tracking of allocation sites in Java. Search on Bibsonomy VEE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF allocation site, memory allocation, hash code
37Yu Sasaki Meet-in-the-Middle Attacks Using Output Truncation in 3-Pass HAVAL. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF wide pipe, pseudo-preimage, hash, preimage, truncate, meet-in-the-middle, HAVAL
37Long Chen 0022, Guoyin Wang 0001 An Efficient Piecewise Hashing Method for Computer Forensics. Search on Bibsonomy WKDD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF File system investigation, Hash, Digital forensics, Computer forensics
37Florian Mendel, Martin Schläffer Collisions for Round-Reduced LAKE. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF cryptanalysis, hash functions, collision attack
37Florian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen On the Collision Resistance of RIPEMD-160. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF RIPEMD-160, low-weight codewords, cryptanalysis, hash function, collision attack, differential attack
37Bin Wang, Yuanhao Chen, Zhiwei Li 0006, Mingjing Li Compact Representation for Large-Scale Clustering and Similarity Search. Search on Bibsonomy PCM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF similarity search, image clustering, hash code
37Anna Östlin, Rasmus Pagh Uniform hashing in constant time and linear space. Search on Bibsonomy STOC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF uniform hashing, data structures, hash function
37Thomas Johansson 0001 Bucket Hashing with a Small Key Size. Search on Bibsonomy EUROCRYPT The full citation details ... 1997 DBLP  DOI  BibTeX  RDF bucket hashing, message authentication, software implementations, authentication codes, Universal hash functions
37Yin-Hsi Kuo, Kuan-Ting Chen, Chien-Hsing Chiang, Winston H. Hsu Query expansion for hash-based image object retrieval. Search on Bibsonomy ACM Multimedia The full citation details ... 2009 DBLP  DOI  BibTeX  RDF query expansion, locality sensitive hashing (LSH)
37Rishiraj Bhattacharyya, Avradip Mandal, Mridul Nandi Indifferentiability Characterization of Hash Functions and Optimal Bounds of Popular Domain Extensions. Search on Bibsonomy INDOCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Indifferentiability, Merkle-Damgård, HAIFA, Tree mode of operations with counter
37Dae Hyun Yum, Jae Woo Seo, Sungwook Eom, Pil Joong Lee Single-Layer Fractal Hash Chain Traversal with Almost Optimal Complexity. Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Sosina Martirosyan, Tran van Trung Explicit constructions for perfect hash families. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF AMS Classification 05B05
37Yevgeniy Dodis, Prashant Puniya Getting the Best Out of Existing Hash Functions; or What if We Are Stuck with SHA?. Search on Bibsonomy ACNS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Christophe Petit 0001, Kristin E. Lauter, Jean-Jacques Quisquater Full Cryptanalysis of LPS and Morgenstern Hash Functions. Search on Bibsonomy SCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Ahto Buldas, Margus Niitsoo Can We Construct Unbounded Time-Stamping Schemes from Collision-Free Hash Functions?. Search on Bibsonomy ProvSec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Andrey Bogdanov, Gregor Leander, Christof Paar, Axel Poschmann, Matthew J. B. Robshaw, Yannick Seurin Hash Functions and RFID Tags: Mind the Gap. Search on Bibsonomy CHES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Mridul Nandi, Douglas R. Stinson Multicollision Attacks on Some Generalized Sequential Hash Functions. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
37Sujoy Roy, Qibin Sun Robust Hash for Detecting and Localizing Image Tampering. Search on Bibsonomy ICIP (6) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
37Zeghid Medien, Belgacem Bouallegue, Adel Baganne, Mohsen Machhout, Rached Tourki A Reconfigurable Implementation of the New Secure Hash Algorithm. Search on Bibsonomy ARES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
37Mihir Bellare, Thomas Ristenpart Hash Functions in the Dedicated-Key Setting: Design Choices and MPP Transforms. Search on Bibsonomy ICALP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
37Josef Scharinger A Systems Theoretic Approach to the Design of Scalable Cryptographic Hash Functions. Search on Bibsonomy EUROCAST The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
37Lihua Liu, Hao Shen Explicit constructions of separating hash families from algebraic curves over finite fields. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF AMS Classification 05D05, 05D40
37Barzan Mozafari, Mohammad Hasan Savoji 0001 A new collision resistant hash function based on optimum dimensionality reduction using Walsh-Hadamard transform. Search on Bibsonomy ICIT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
37Martin Feldhofer, Christian Rechberger A Case Against Currently Used Hash Functions in RFID Protocols. Search on Bibsonomy OTM Workshops (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
37Philipp Woelfel Maintaining External Memory Efficient Hash Tables. Search on Bibsonomy APPROX-RANDOM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
37Harald Widiger, Ralf Salomon, Dirk Timmermann Packet Classification with Evolvable Hardware Hash Functions - An Intrinsic Approach. Search on Bibsonomy BioADIT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
37Bo Yang 0010, Ramesh Karri, David A. McGrew Divide-and-concatenate: an architecture-level optimization technique for universal hash functions. Search on Bibsonomy IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
37Norbert Pramstaller, Christian Rechberger, Vincent Rijmen Impact of Rotations in SHA-1 and Related Hash Functions. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
37Yih-Chun Hu, Markus Jakobsson, Adrian Perrig Efficient Constructions for One-Way Hash Chains. Search on Bibsonomy ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
37Quan Son Nguyen Multi-Dimensional Hash Chains and Application to Micropayment Schemes. Search on Bibsonomy WCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
37Navapot Prakobpol, Yongyuth Permpoontanalarp Multi-dimensional Hash Chain For Sealed-Bid Auction. Search on Bibsonomy WISA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
37ByungHoon Kang, Robert Wilensky, John Kubiatowicz The Hash History Approach for Reconciling Mutual Inconsistency. Search on Bibsonomy ICDCS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
37Mitsuhiro Hattori, Shoichi Hirose, Susumu Yoshida Analysis of Double Block Length Hash Functions. Search on Bibsonomy IMACC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
37Phillip G. Bradford, Olga V. Gavrylyako Foundations of Security for Hash Chains in Ad Hoc Networks. Search on Bibsonomy ICDCS Workshops The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
37Xiu Wu, Kian-Lee Tan A Hash-Based Collaborative Transcoding Proxy System. Search on Bibsonomy APWeb The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
37Shoichi Hirose Secure Block Ciphers Are Not Sufficient for One-Way Hash Functions in the Preneel-Govaerts-Vandewalle Model. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
37Miodrag J. Mihaljevic, Yuliang Zheng 0001, Hideki Imai A Cellular Automaton Based Fast One-Way Hash Function Suitable for Hardware Implementation. Search on Bibsonomy Public Key Cryptography The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
37Ming-Ling Lo, Chinya V. Ravishankar Spatial Hash-Joins. Search on Bibsonomy SIGMOD Conference The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
37Judy Goldsmith, Lane A. Hemachandra, Kenneth Kunen On the Structure and Complexity of Infinite Sets with Minimal Perfect Hash Functions. Search on Bibsonomy FSTTCS The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
37Jean-Jacques Quisquater, Marc Girault 2n-Bit Hash-Functions Using n-Bit Symmetric Block Cipher Algorithms. Search on Bibsonomy EUROCRYPT The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
36Robert S. Boyer, Warren A. Hunt Jr. Function memoization and unique object representation for ACL2 functions. Search on Bibsonomy ACL2 The full citation details ... 2006 DBLP  DOI  BibTeX  RDF ACL2 workshop, function memoization, hash CONS, hash CONSing, Lisp, ACL2
36Tatsuya Akutsu, Kentaro Onizuka, Masato Ishikawa New hashing techniques and their application to a protein structure database system. Search on Bibsonomy HICSS (5) The full citation details ... 1995 DBLP  DOI  BibTeX  RDF protein structure database system, hash vector, fixed length fragment, three dimensional protein structure, true hash vectors, root mean square deviation, PDB data, PROTEIX, database management systems, database management system, file organisation, biology computing, proteins, protein structures, structural similarity, molecular configurations, molecular biophysics, hashing techniques
36Atefeh Mashatan, Douglas R. Stinson Interactive two-channel message authentication based on Interactive-Collision Resistant hash functions. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Two-channel cryptography, Authenticated channel, Hash functions, Message authentication
36En Tzu Wang, Arbee L. P. Chen A novel hash-based approach for mining frequent itemsets over data streams requiring less memory space. Search on Bibsonomy Data Min. Knowl. Discov. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Hash-based approach, Data mining, Data stream, Frequent itemset, False positive
36Nikos Ntarmos, Peter Triantafillou, Gerhard Weikum Distributed hash sketches: Scalable, efficient, and accurate cardinality estimation for distributed multisets. Search on Bibsonomy ACM Trans. Comput. Syst. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF distributed cardinality estimation, distributed data summary structures, hash sketches, peer-to-peer networks and systems, distributed information systems, Distributed estimation
36Shuang Wu 0004, Dengguo Feng, Wenling Wu Cryptanalysis of the LANE Hash Function. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF rebound attack, LANE, hash function, collision attack, SHA-3 candidates
36Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu 0001 Analysis of Property-Preservation Capabilities of the ROX and ESh Hash Domain Extenders. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF ROX, ESh, Hash Functions, MPP, Domain Extension
36Dirk Henrici, Paul Müller 0001 Providing Security and Privacy in RFID Systems Using Triggered Hash Chains. Search on Bibsonomy PerCom The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Security, Privacy, Ubiquitous Computing, Pervasive Computing, RFID, Hash Functions
36Fan Zhang, Jianfeng Ma 0001, Sang-Jae Moon Universally composable anonymous Hash certification model. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF authentication, anonymous, Hash, universal composable security
36Máire McLoone, Ciaran McIvor High-speed & Low Area Hardware Architectures of the Whirlpool Hash Function. Search on Bibsonomy J. VLSI Signal Process. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF hash function implementation, cryptography, whirlpool
36Muhamamd Shahazad Mughal, M. Nawaz, Farhan Ahmad, Saadia Shahzad, A. K. Bhatti, S. Mohsin A 3D-Hash Function for Fast Image Indexing and Retrieval. Search on Bibsonomy CGIV The full citation details ... 2007 DBLP  DOI  BibTeX  RDF 3D hash function, image retrieval, perfect hashing function, Image database systems, 2D string
36Lars R. Knudsen, Christian Rechberger, Søren S. Thomsen The Grindahl Hash Functions. Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF hash functions, AES, Rijndael, proposal, design strategy
36Christian Rechberger, Vincent Rijmen, Nicolas Sklavos 0001 The NIST Cryptographic Workshop on Hash Functions. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security, cryptanalysis, hash functions, SHA-1
36Thomas Peyrin, Henri Gilbert, Frédéric Muller, Matthew J. B. Robshaw Combining Compression Functions and Block Cipher-Based Hash Functions. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF block ciphers, hash functions, compression functions
36Katsuyuki Okeya Side Channel Attacks Against HMACs Based on Block-Cipher Based Hash Functions. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF (keyed) hash function, PGV construction, reverse DPA, side channel attacks, differential power analysis (DPA), HMAC
36Philip Garcia, Henry F. Korth Database hash-join algorithms on multithreaded computer architectures. Search on Bibsonomy Conf. Computing Frontiers The full citation details ... 2006 DBLP  DOI  BibTeX  RDF performance, database, multithreading, software pipelining, SMT, memory performance, software prefetching, hash-join
36Daniel Joscák, Jirí Tuma Multi-block Collisions in Hash Functions Based on 3C and 3C+ Enhancements of the Merkle-Damgård Construction. Search on Bibsonomy ICISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF multi-block collision attack, 3C and 3C+ constructions, hash functions
36Hui Gao, Jan Friso Groote, Wim H. Hesselink Lock-free dynamic hash tables with open addressing. Search on Bibsonomy Distributed Comput. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Distributed algorithms, Wait-free, Lock-free, Hash tables
36Iuon-Chang Lin, Min-Shiang Hwang, Chin-Chen Chang 0001 The General Pay-Word: A Micro-payment Scheme Based on n-dimension One-way Hash Chain. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF one-way hash function, micro-payment
Displaying result #101 - #200 of 7013 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license