|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 3717 occurrences of 1502 keywords
|
|
|
Results
Found 7025 publication records. Showing 7013 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
43 | Sailesh Kumar, Jonathan S. Turner, Patrick Crowley |
Peacock Hashing: Deterministic and Updatable Hashing for High Performance Networking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INFOCOM ![In: INFOCOM 2008. 27th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 13-18 April 2008, Phoenix, AZ, USA, pp. 101-105, 2008, IEEE, 978-1-4244-2026-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
42 | Mario Lamberger, Florian Mendel |
Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings, pp. 68-78, 2009, Springer, 978-3-642-04473-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Blender, DCH, Hash functions, collision attacks, preimage attacks, SHA-3 |
42 | Zhewei Wei, Ke Yi 0001, Qin Zhang 0001 |
Dynamic external hashing: the limit of buffering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPAA ![In: SPAA 2009: Proceedings of the 21st Annual ACM Symposium on Parallelism in Algorithms and Architectures, Calgary, Alberta, Canada, August 11-13, 2009, pp. 253-259, 2009, ACM, 978-1-60558-606-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
dynamic hash table, successful query, lower bound |
42 | Kimmo Halunen, Pauli Rikula, Juha Röning |
On the Security of VSH in Password Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 828-833, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
VSH, hash function, preimage attack, password security |
42 | Martin Dietzfelbinger, Ulf Schellbach |
On risks of using cuckoo hashing with simple universal hash classes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SODA ![In: Proceedings of the Twentieth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2009, New York, NY, USA, January 4-6, 2009, pp. 795-804, 2009, SIAM, 978-0-89871-680-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
42 | Heeyeol Yu, Rabi N. Mahapatra, Laxmi N. Bhuyan |
A Hash-based Scalable IP lookup using Bloom and Fingerprint Filters. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNP ![In: Proceedings of the 17th annual IEEE International Conference on Network Protocols, 2009. ICNP 2009, Princeton, NJ, USA, 13-16 October 2009, pp. 264-273, 2009, IEEE Computer Society, 978-1-4244-4634-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
42 | Weiming Li, Bin Ma 0002, Kaizhong Zhang |
Amino Acid Classification and Hash Seeds for Homology Search. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BICoB ![In: Bioinformatics and Computational Biology, First International Conference, BICoB 2009, New Orleans, LA, USA, April 8-10, 2009. Proceedings, pp. 44-51, 2009, Springer, 978-3-642-00726-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
42 | Xiantao Zhang, Anthony X. F. Xu, Qi Li 0002, David K. Y. Yau, Sihan Qing, Huanguo Zhang |
A hash-TLB approach for MMU virtualization in xen/IA64. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPDPS ![In: 22nd IEEE International Symposium on Parallel and Distributed Processing, IPDPS 2008, Miami, Florida USA, April 14-18, 2008, pp. 1-8, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
42 | Donghoon Chang, Mridul Nandi |
Improved Indifferentiability Security Analysis of chopMD Hash Function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers, pp. 429-443, 2008, Springer, 978-3-540-71038-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
42 | Olivier Billet, Matthew J. B. Robshaw, Thomas Peyrin |
On Building Hash Functions from Multivariate Quadratic Equations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings, pp. 82-95, 2007, Springer, 978-3-540-73457-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
42 | Donghoon Chang, Sangjin Lee 0002, Mridul Nandi, Moti Yung |
Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings, pp. 283-298, 2006, Springer, 3-540-49475-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
42 | Xiaoyun Wang 0001, Xuejia Lai, Dengguo Feng, Hui Chen, Xiuyuan Yu |
Cryptanalysis of the Hash Functions MD4 and RIPEMD. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings, pp. 1-18, 2005, Springer, 3-540-25910-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
42 | Esam Khan, M. Watheq El-Kharashi, Fayez Gebali, Mostafa I. H. Abd-El-Barr |
An FPGA Design of a Unified Hash Engine for IPSec Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSOC ![In: Proceedings of the 5th IEEE International Workshop on System-on-Chip for Real-Time Applications (IWSOC 2005), 20-24 July 2004, Banff, Alberta, Canada, pp. 450-453, 2005, IEEE Computer Society, 0-7695-2403-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
42 | Mihir Bellare, Tadayoshi Kohno |
Hash Function Balance and Its Impact on Birthday Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings, pp. 401-418, 2004, Springer, 3-540-21935-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
42 | Xi Zhang, Tahsin M. Kurç, Tony Pan, Ümit V. Çatalyürek, Sivaramakrishnan Narayanan, Pete Wyckoff, Joel H. Saltz |
Strategies for Using Additional Resources in Parallel Hash-Based Join Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HPDC ![In: 13th International Symposium on High-Performance Distributed Computing (HPDC-13 2004), 4-6 June 2004, Honolulu, Hawaii, USA, pp. 4-13, 2004, IEEE Computer Society, 0-7695-2175-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
42 | Frank Olken, Doron Rotem, Ping Xu |
Random Sampling from Hash Files. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMOD Conference ![In: Proceedings of the 1990 ACM SIGMOD International Conference on Management of Data, Atlantic City, NJ, USA, May 23-25, 1990., pp. 375-386, 1990, ACM Press, 978-0-89791-365-2. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
42 | Yuliang Zheng 0001, Tsutomu Matsumoto, Hideki Imai |
Structural Properties of One-way Hash Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '90, 10th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1990, Proceedings, pp. 285-302, 1990, Springer, 3-540-54508-5. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
42 | Marc Girault |
Hash-Functions Using Modulo-N Operations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '87, Workshop on the Theory and Application of of Cryptographic Techniques, Amsterdam, The Netherlands, April 13-15, 1987, Proceedings, pp. 217-226, 1987, Springer, 3-540-19102-X. The full citation details ...](Pics/full.jpeg) |
1987 |
DBLP DOI BibTeX RDF |
|
42 | Mridul Nandi |
Characterizing Padding Rules of MD Hash Functions Preserving Collision Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 14th Australasian Conference, ACISP 2009, Brisbane, Australia, July 1-3, 2009, Proceedings, pp. 171-184, 2009, Springer, 978-3-642-02619-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
MD hash function, padding rule, suffix-free, collision resistant |
42 | Yong Ki Lee, Herwin Chan, Ingrid Verbauwhede |
Design Methodology for Throughput Optimum Architectures of Hash Algorithms of the MD4-class. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Signal Process. Syst. ![In: J. Signal Process. Syst. 53(1-2), pp. 89-102, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Architecture design methodology, MD4-based hash algorithm, SHA1, RIPEMD-160, Iteration bound analysis, DFG (Data Flow Graph) transformation, Throughput optimization, MD5 |
42 | Elena Andreeva 0001, Charles Bouillaguet, Pierre-Alain Fouque, Jonathan J. Hoch, John Kelsey, Adi Shamir, Sébastien Zimmer |
Second Preimage Attacks on Dithered Hash Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings, pp. 270-288, 2008, Springer, 978-3-540-78966-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Cryptanalysis, Hash Function, Dithering |
42 | Shimin Chen, Anastassia Ailamaki, Phillip B. Gibbons, Todd C. Mowry |
Improving hash join performance through prefetching. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Database Syst. ![In: ACM Trans. Database Syst. 32(3), pp. 17, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
CPU cache performance, CPU cache prefetching, group prefetching, software-pipelined prefetching, Hash join |
42 | Athanasios Kakarountas, Haralambos Michail, Athanasios Milidonis, Costas E. Goutis, George Theodoridis |
High-Speed FPGA Implementation of Secure Hash Algorithm for IPSec and VPN Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Supercomput. ![In: J. Supercomput. 37(2), pp. 179-195, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
high-speed performance, Security, FPGA, hash function, hardware implementation |
42 | Norbert Pramstaller, Christian Rechberger, Vincent Rijmen |
A compact FPGA implementation of the hash function whirlpool. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FPGA ![In: Proceedings of the ACM/SIGDA 14th International Symposium on Field Programmable Gate Arrays, FPGA 2006, Monterey, California, USA, February 22-24, 2006, pp. 159-166, 2006, ACM, 1-59593-292-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
compact hardware implementation, FPGA, hash function, whirlpool |
42 | Jean-Christophe Filliâtre, Sylvain Conchon |
Type-safe modular hash-consing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ML ![In: Proceedings of the ACM Workshop on ML, 2006, Portland, Oregon, USA, September 16, 2006, pp. 12-19, 2006, ACM, 1-59593-483-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
hash-consing, data structures, sharing |
42 | Jahangir Hasan, Srihari Cadambi, Venkata Jakkula, Srimat T. Chakradhar |
Chisel: A Storage-efficient, Collision-free Hash-based Network Processing Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCA ![In: 33rd International Symposium on Computer Architecture (ISCA 2006), June 17-21, 2006, Boston, MA, USA, pp. 203-215, 2006, IEEE Computer Society, 0-7695-2608-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Bloom Filters, Packet Classification, Hash Tables, IP Lookup, Longest Prefix Matching |
42 | Norbert Pramstaller, Christian Rechberger, Vincent Rijmen |
Breaking a New Hash Function Design Strategy Called SMASH. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 12th International Workshop, SAC 2005, Kingston, ON, Canada, August 11-12, 2005, Revised Selected Papers, pp. 233-244, 2005, Springer, 3-540-33108-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
SMASH, cryptanalysis, hash functions, collision |
42 | John Black, Martin Cochran, Thomas Shrimpton |
On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings, pp. 526-541, 2005, Springer, 3-540-25910-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
provable security, tweakable blockciphers, Collision-resistant hash functions |
42 | Ram D. Gopal, Ram Ramesh, Stanley Zionts |
Criss-Cross Hash Joins: Design and Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 13(4), pp. 637-653, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
relational architecture, Database, query processing, hash, index, join |
42 | Palash Sarkar 0001, Paul J. Schellenberg |
A Parallel Algorithm for Extending Cryptographic Hash Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2001, Second International Conference on Cryptology in India, Chennai, India, December 16-20, 2001, Proceedings, pp. 40-49, 2001, Springer, 3-540-43010-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Merkle-Damgard construction, parallel algorithm, cryptographic hash function, collision resistance |
42 | Bok-Min Goi, M. U. Siddiqi, Hean-Teik Chuah |
Incremental Hash Function Based on Pair Chaining & Modular Arithmetic Combining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2001, Second International Conference on Cryptology in India, Chennai, India, December 16-20, 2001, Proceedings, pp. 50-61, 2001, Springer, 3-540-43010-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Incremental Cryptography, Cryptography, Hash Function |
42 | Sung-Ming Yen, Yuliang Zheng 0001 |
Weighted One-Way Hash Chain and Its Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, Third International Workshop, ISW 2000, Wollongong, NSW, Australia, December 20-21, 2000, Proceedings, pp. 135-148, 2000, Springer, 3-540-41416-9. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
One-way hash chain, Portable computing device, Cryptography, Electronic commerce, Micropayment |
42 | Rosario Gennaro, Shai Halevi, Tal Rabin |
Secure Hash-and-Sign Signatures Without the Random Oracle. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999, Proceeding, pp. 123-139, 1999, Springer, 3-540-65889-0. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Hash and Sign, Smooth Numbers, Digital Signatures, RSA, Random Oracle, Chameleon Hashing |
42 | Daniel R. Simon |
Finding Collisions on a One-Way Street: Can Secure Hash Functions Be Based on General Assumptions? ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31 - June 4, 1998, Proceeding, pp. 334-345, 1998, Springer, 3-540-64518-7. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
cryptography, Hash functions, oracle, complexity theory |
41 | Lars R. Knudsen, Xuejia Lai |
New Attacks on all Double Block Length Hash Functions of Hash Rate 1, including the Parallel-DM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '94, Workshop on the Theory and Application of Cryptographic Techniques, Perugia, Italy, May 9-12, 1994, Proceedings, pp. 410-418, 1994, Springer, 3-540-60176-7. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
41 | Luigi Dadda, Marco Macchetti, Jeff Owen |
An ASIC design for a high speed implementation of the hash function SHA-256 (384, 512). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Great Lakes Symposium on VLSI ![In: Proceedings of the 14th ACM Great Lakes Symposium on VLSI 2004, Boston, MA, USA, April 26-28, 2004, pp. 421-425, 2004, ACM, 1-58113-853-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
secure hash standard, hash function, data authentication |
38 | Rasmus Pagh, Zhewei Wei, Ke Yi 0001, Qin Zhang 0001 |
Cache-oblivious hashing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PODS ![In: Proceedings of the Twenty-Ninth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, PODS 2010, June 6-11, 2010, Indianapolis, Indiana, USA, pp. 297-304, 2010, ACM, 978-1-4503-0033-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
hashing, cache-oblivious algorithms |
38 | Bo Yang 0010, Ramesh Karri, David A. McGrew |
A High-Speed Hardware Architecture for Universal Message Authentication Code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE J. Sel. Areas Commun. ![In: IEEE J. Sel. Areas Commun. 24(10), pp. 1831-1839, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
38 | Baris Coskun, Bülent Sankur, Nasir D. Memon |
Spatio-Temporal Transform Based Video Hashing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Multim. ![In: IEEE Trans. Multim. 8(6), pp. 1190-1208, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
38 | Peter C. Dillinger, Panagiotis Manolios |
Fast and Accurate Bitstate Verification for SPIN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPIN ![In: Model Checking Software, 11th International SPIN Workshop, Barcelona, Spain, April 1-3, 2004, Proceedings, pp. 57-75, 2004, Springer, 3-540-21314-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
38 | Wonil Lee, Mridul Nandi, Palash Sarkar 0001, Donghoon Chang, Sangjin Lee 0002, Kouichi Sakurai |
Pseudorandomness of SPN-Type Transformations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy: 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004. Proceedings, pp. 212-223, 2004, Springer, 3-540-22379-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
37 | Rei Odaira, Kazunori Ogata, Kiyokuni Kawachiya, Tamiya Onodera, Toshio Nakatani |
Efficient runtime tracking of allocation sites in Java. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VEE ![In: Proceedings of the 6th International Conference on Virtual Execution Environments, VEE 2010, Pittsburgh, Pennsylvania, USA, March 17-19, 2010, pp. 109-120, 2010, ACM, 978-1-60558-910-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
allocation site, memory allocation, hash code |
37 | Yu Sasaki |
Meet-in-the-Middle Attacks Using Output Truncation in 3-Pass HAVAL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings, pp. 79-94, 2009, Springer, 978-3-642-04473-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
wide pipe, pseudo-preimage, hash, preimage, truncate, meet-in-the-middle, HAVAL |
37 | Long Chen 0022, Guoyin Wang 0001 |
An Efficient Piecewise Hashing Method for Computer Forensics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WKDD ![In: Proceedings of the International Workshop on Knowledge Discovery and Data Mining, WKDD 2008, Adelaide, Australia, 23-24 January 2008, pp. 635-638, 2008, IEEE Computer Society, 0-7695-3090-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
File system investigation, Hash, Digital forensics, Computer forensics |
37 | Florian Mendel, Martin Schläffer |
Collisions for Round-Reduced LAKE. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings, pp. 267-281, 2008, Springer, 978-3-540-69971-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
cryptanalysis, hash functions, collision attack |
37 | Florian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen |
On the Collision Resistance of RIPEMD-160. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 9th International Conference, ISC 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings, pp. 101-116, 2006, Springer, 3-540-38341-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
RIPEMD-160, low-weight codewords, cryptanalysis, hash function, collision attack, differential attack |
37 | Bin Wang, Yuanhao Chen, Zhiwei Li 0006, Mingjing Li |
Compact Representation for Large-Scale Clustering and Similarity Search. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PCM ![In: Advances in Multimedia Information Processing - PCM 2006, 7th Pacific Rim Conference on Multimedia, Hangzhou, China, November 2-4, 2006, Proceedings, pp. 835-843, 2006, Springer, 3-540-48766-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
similarity search, image clustering, hash code |
37 | Anna Östlin, Rasmus Pagh |
Uniform hashing in constant time and linear space. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STOC ![In: Proceedings of the 35th Annual ACM Symposium on Theory of Computing, June 9-11, 2003, San Diego, CA, USA, pp. 622-628, 2003, ACM, 1-58113-674-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
uniform hashing, data structures, hash function |
37 | Thomas Johansson 0001 |
Bucket Hashing with a Small Key Size. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '97, International Conference on the Theory and Application of Cryptographic Techniques, Konstanz, Germany, May 11-15, 1997, Proceeding, pp. 149-162, 1997, Springer, 3-540-62975-0. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
bucket hashing, message authentication, software implementations, authentication codes, Universal hash functions |
37 | Yin-Hsi Kuo, Kuan-Ting Chen, Chien-Hsing Chiang, Winston H. Hsu |
Query expansion for hash-based image object retrieval. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Multimedia ![In: Proceedings of the 17th International Conference on Multimedia 2009, Vancouver, British Columbia, Canada, October 19-24, 2009, pp. 65-74, 2009, ACM, 978-1-60558-608-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
query expansion, locality sensitive hashing (LSH) |
37 | Rishiraj Bhattacharyya, Avradip Mandal, Mridul Nandi |
Indifferentiability Characterization of Hash Functions and Optimal Bounds of Popular Domain Extensions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2009, 10th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009. Proceedings, pp. 199-218, 2009, Springer, 978-3-642-10627-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Indifferentiability, Merkle-Damgård, HAIFA, Tree mode of operations with counter |
37 | Dae Hyun Yum, Jae Woo Seo, Sungwook Eom, Pil Joong Lee |
Single-Layer Fractal Hash Chain Traversal with Almost Optimal Complexity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2009, The Cryptographers' Track at the RSA Conference 2009, San Francisco, CA, USA, April 20-24, 2009. Proceedings, pp. 325-339, 2009, Springer, 978-3-642-00861-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
37 | Sosina Martirosyan, Tran van Trung |
Explicit constructions for perfect hash families. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 46(1), pp. 97-112, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
AMS Classification 05B05 |
37 | Yevgeniy Dodis, Prashant Puniya |
Getting the Best Out of Existing Hash Functions; or What if We Are Stuck with SHA?. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings, pp. 156-173, 2008, 978-3-540-68913-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
37 | Christophe Petit 0001, Kristin E. Lauter, Jean-Jacques Quisquater |
Full Cryptanalysis of LPS and Morgenstern Hash Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks, 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008. Proceedings, pp. 263-277, 2008, Springer, 978-3-540-85854-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
37 | Ahto Buldas, Margus Niitsoo |
Can We Construct Unbounded Time-Stamping Schemes from Collision-Free Hash Functions?. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings, pp. 254-267, 2008, Springer, 978-3-540-88732-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
37 | Andrey Bogdanov, Gregor Leander, Christof Paar, Axel Poschmann, Matthew J. B. Robshaw, Yannick Seurin |
Hash Functions and RFID Tags: Mind the Gap. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings, pp. 283-299, 2008, Springer, 978-3-540-85052-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
37 | Mridul Nandi, Douglas R. Stinson |
Multicollision Attacks on Some Generalized Sequential Hash Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Theory ![In: IEEE Trans. Inf. Theory 53(2), pp. 759-767, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
37 | Sujoy Roy, Qibin Sun |
Robust Hash for Detecting and Localizing Image Tampering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP (6) ![In: Proceedings of the International Conference on Image Processing, ICIP 2007, September 16-19, 2007, San Antonio, Texas, USA, pp. 117-120, 2007, IEEE, 978-1-4244-1436-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
37 | Zeghid Medien, Belgacem Bouallegue, Adel Baganne, Mohsen Machhout, Rached Tourki |
A Reconfigurable Implementation of the New Secure Hash Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Second International Conference on Availability, Reliability and Security, ARES 2007, The International Dependability Conference - Bridging Theory and Practice, April 10-13 2007, Vienna, Austria, pp. 281-285, 2007, IEEE Computer Society, 0-7695-2775-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
37 | Mihir Bellare, Thomas Ristenpart |
Hash Functions in the Dedicated-Key Setting: Design Choices and MPP Transforms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICALP ![In: Automata, Languages and Programming, 34th International Colloquium, ICALP 2007, Wroclaw, Poland, July 9-13, 2007, Proceedings, pp. 399-410, 2007, Springer, 978-3-540-73419-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
37 | Josef Scharinger |
A Systems Theoretic Approach to the Design of Scalable Cryptographic Hash Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCAST ![In: Computer Aided Systems Theory - EUROCAST 2007, 11th International Conference on Computer Aided Systems Theory, Las Palmas de Gran Canaria, Spain, February 12-16, 2007, Revised Selected Papers, pp. 10-17, 2007, Springer, 978-3-540-75866-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
37 | Lihua Liu, Hao Shen |
Explicit constructions of separating hash families from algebraic curves over finite fields. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 41(2), pp. 221-233, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
AMS Classification 05D05, 05D40 |
37 | Barzan Mozafari, Mohammad Hasan Savoji 0001 |
A new collision resistant hash function based on optimum dimensionality reduction using Walsh-Hadamard transform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIT ![In: 9th International Conference in Information Technology, ICIT 2006, Bhubaneswar, Orissa, India, 18-21 December 2006, pp. 149-154, 2006, IEEE Computer Society, 0-7695-2635-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
37 | Martin Feldhofer, Christian Rechberger |
A Case Against Currently Used Hash Functions in RFID Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM Workshops (1) ![In: On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, OTM Confederated International Workshops and Posters, AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET, OnToContent, ORM, PerSys, OTM Academy Doctoral Consortium, RDDS, SWWS, and SeBGIS 2006, Montpellier, France, October 29 - November 3, 2006. Proceedings, Part I, pp. 372-381, 2006, Springer, 3-540-48269-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
37 | Philipp Woelfel |
Maintaining External Memory Efficient Hash Tables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APPROX-RANDOM ![In: Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques, 9th International Workshop on Approximation Algorithms for Combinatorial Optimization Problems, APPROX 2006 and 10th International Workshop on Randomization and Computation, RANDOM 2006, Barcelona, Spain, August 28-30 2006, Proceedings, pp. 508-519, 2006, Springer, 3-540-38044-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
37 | Harald Widiger, Ralf Salomon, Dirk Timmermann |
Packet Classification with Evolvable Hardware Hash Functions - An Intrinsic Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BioADIT ![In: Biologically Inspired Approaches to Advanced Information Technology, Second International Workshop, BioADIT 2006, Osaka, Japan, January 26-27, 2006, Proceedings, pp. 64-79, 2006, Springer, 3-540-31253-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
37 | Bo Yang 0010, Ramesh Karri, David A. McGrew |
Divide-and-concatenate: an architecture-level optimization technique for universal hash functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. ![In: IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 24(11), pp. 1740-1747, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
37 | Norbert Pramstaller, Christian Rechberger, Vincent Rijmen |
Impact of Rotations in SHA-1 and Related Hash Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 12th International Workshop, SAC 2005, Kingston, ON, Canada, August 11-12, 2005, Revised Selected Papers, pp. 261-275, 2005, Springer, 3-540-33108-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
37 | Yih-Chun Hu, Markus Jakobsson, Adrian Perrig |
Efficient Constructions for One-Way Hash Chains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005, Proceedings, pp. 423-441, 2005, 3-540-26223-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
37 | Quan Son Nguyen |
Multi-Dimensional Hash Chains and Application to Micropayment Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCC ![In: Coding and Cryptography, International Workshop, WCC 2005, Bergen, Norway, March 14-18, 2005. Revised Selected Papers, pp. 218-228, 2005, Springer, 978-3-540-35481-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
37 | Navapot Prakobpol, Yongyuth Permpoontanalarp |
Multi-dimensional Hash Chain For Sealed-Bid Auction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 4th International Workshop, WISA 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers, pp. 257-271, 2003, Springer, 3-540-20827-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
37 | ByungHoon Kang, Robert Wilensky, John Kubiatowicz |
The Hash History Approach for Reconciling Mutual Inconsistency. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS ![In: 23rd International Conference on Distributed Computing Systems (ICDCS 2003), 19-22 May 2003, Providence, RI, USA, pp. 670-677, 2003, IEEE Computer Society, 0-7695-1920-2. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
37 | Mitsuhiro Hattori, Shoichi Hirose, Susumu Yoshida |
Analysis of Double Block Length Hash Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMACC ![In: Cryptography and Coding, 9th IMA International Conference, Cirencester, UK, December 16-18, 2003, Proceedings, pp. 290-302, 2003, Springer, 3-540-20663-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
37 | Phillip G. Bradford, Olga V. Gavrylyako |
Foundations of Security for Hash Chains in Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS Workshops ![In: 23rd International Conference on Distributed Computing Systems Workshops (ICDCS 2003 Workshops), 19-22 May 2003, Providence, RI, USA, pp. 743-748, 2003, IEEE Computer Society, 0-7695-1921-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
37 | Xiu Wu, Kian-Lee Tan |
A Hash-Based Collaborative Transcoding Proxy System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APWeb ![In: Web Technologies and Applications, 5th Asian-Pacific Web Conference, APWeb 2003, Xian, China, April 23-25, 2002, Proceedings, pp. 570-582, 2003, Springer, 3-540-02354-2. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
37 | Shoichi Hirose |
Secure Block Ciphers Are Not Sufficient for One-Way Hash Functions in the Preneel-Govaerts-Vandewalle Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 9th Annual International Workshop, SAC 2002, St. John's, Newfoundland, Canada, August 15-16, 2002. Revised Papers, pp. 339-352, 2002, Springer, 3-540-00622-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
37 | Miodrag J. Mihaljevic, Yuliang Zheng 0001, Hideki Imai |
A Cellular Automaton Based Fast One-Way Hash Function Suitable for Hardware Implementation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography, First International Workshop on Practice and Theory in Public Key Cryptography, PKC '98, Pacifico Yokohama, Japan, February 5-6, 1998, Proceedings, pp. 217-233, 1998, Springer, 3-540-64693-0. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
37 | Ming-Ling Lo, Chinya V. Ravishankar |
Spatial Hash-Joins. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMOD Conference ![In: Proceedings of the 1996 ACM SIGMOD International Conference on Management of Data, Montreal, Quebec, Canada, June 4-6, 1996., pp. 247-258, 1996, ACM Press, 978-0-89791-794-0. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
37 | Judy Goldsmith, Lane A. Hemachandra, Kenneth Kunen |
On the Structure and Complexity of Infinite Sets with Minimal Perfect Hash Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSTTCS ![In: Foundations of Software Technology and Theoretical Computer Science, 11th Conference, New Delhi, India, December 17-19, 1991, Proceedings, pp. 212-223, 1991, Springer, 3-540-54967-6. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
37 | Jean-Jacques Quisquater, Marc Girault |
2n-Bit Hash-Functions Using n-Bit Symmetric Block Cipher Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '89, Workshop on the Theory and Application of of Cryptographic Techniques, Houthalen, Belgium, April 10-13, 1989, Proceedings, pp. 102-109, 1989, Springer, 3-540-53433-4. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
36 | Robert S. Boyer, Warren A. Hunt Jr. |
Function memoization and unique object representation for ACL2 functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACL2 ![In: Proceedings of the Sixth International Workshop on the ACL2 Theorem Prover and its Applications, ACL2 2006, Seattle, Washington, USA, August 15-16, 2006, pp. 81-89, 2006, ACM, 0-9788493-0-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
ACL2 workshop, function memoization, hash CONS, hash CONSing, Lisp, ACL2 |
36 | Tatsuya Akutsu, Kentaro Onizuka, Masato Ishikawa |
New hashing techniques and their application to a protein structure database system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS (5) ![In: 28th Annual Hawaii International Conference on System Sciences (HICSS-28), January 3-6, 1995, Kihei, Maui, Hawaii, USA, pp. 197-206, 1995, IEEE Computer Society, 0-8186-6945-4. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
protein structure database system, hash vector, fixed length fragment, three dimensional protein structure, true hash vectors, root mean square deviation, PDB data, PROTEIX, database management systems, database management system, file organisation, biology computing, proteins, protein structures, structural similarity, molecular configurations, molecular biophysics, hashing techniques |
36 | Atefeh Mashatan, Douglas R. Stinson |
Interactive two-channel message authentication based on Interactive-Collision Resistant hash functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 8(1), pp. 49-60, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Two-channel cryptography, Authenticated channel, Hash functions, Message authentication |
36 | En Tzu Wang, Arbee L. P. Chen |
A novel hash-based approach for mining frequent itemsets over data streams requiring less memory space. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Min. Knowl. Discov. ![In: Data Min. Knowl. Discov. 19(1), pp. 132-172, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Hash-based approach, Data mining, Data stream, Frequent itemset, False positive |
36 | Nikos Ntarmos, Peter Triantafillou, Gerhard Weikum |
Distributed hash sketches: Scalable, efficient, and accurate cardinality estimation for distributed multisets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Comput. Syst. ![In: ACM Trans. Comput. Syst. 27(1), pp. 2:1-2:53, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
distributed cardinality estimation, distributed data summary structures, hash sketches, peer-to-peer networks and systems, distributed information systems, Distributed estimation |
36 | Shuang Wu 0004, Dengguo Feng, Wenling Wu |
Cryptanalysis of the LANE Hash Function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 16th Annual International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers, pp. 126-140, 2009, Springer, 978-3-642-05443-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
rebound attack, LANE, hash function, collision attack, SHA-3 candidates |
36 | Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu 0001 |
Analysis of Property-Preservation Capabilities of the ROX and ESh Hash Domain Extenders. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 14th Australasian Conference, ACISP 2009, Brisbane, Australia, July 1-3, 2009, Proceedings, pp. 153-170, 2009, Springer, 978-3-642-02619-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
ROX, ESh, Hash Functions, MPP, Domain Extension |
36 | Dirk Henrici, Paul Müller 0001 |
Providing Security and Privacy in RFID Systems Using Triggered Hash Chains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PerCom ![In: Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2008), 17-21 March 2008, Hong Kong, pp. 50-59, 2008, IEEE Computer Society, 978-0-7695-3113-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Security, Privacy, Ubiquitous Computing, Pervasive Computing, RFID, Hash Functions |
36 | Fan Zhang, Jianfeng Ma 0001, Sang-Jae Moon |
Universally composable anonymous Hash certification model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. China Ser. F Inf. Sci. ![In: Sci. China Ser. F Inf. Sci. 50(3), pp. 440-455, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
authentication, anonymous, Hash, universal composable security |
36 | Máire McLoone, Ciaran McIvor |
High-speed & Low Area Hardware Architectures of the Whirlpool Hash Function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. VLSI Signal Process. ![In: J. VLSI Signal Process. 47(1), pp. 47-57, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
hash function implementation, cryptography, whirlpool |
36 | Muhamamd Shahazad Mughal, M. Nawaz, Farhan Ahmad, Saadia Shahzad, A. K. Bhatti, S. Mohsin |
A 3D-Hash Function for Fast Image Indexing and Retrieval. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CGIV ![In: 4th International Conference on Computer Graphics, Imaging and Visualization (CGIV 2007), August 14-16, 2007, Bangkok, Thailand, pp. 341-348, 2007, IEEE Computer Society, 0-7695-2928-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
3D hash function, image retrieval, perfect hashing function, Image database systems, 2D string |
36 | Lars R. Knudsen, Christian Rechberger, Søren S. Thomsen |
The Grindahl Hash Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers, pp. 39-57, 2007, Springer, 978-3-540-74617-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
hash functions, AES, Rijndael, proposal, design strategy |
36 | Christian Rechberger, Vincent Rijmen, Nicolas Sklavos 0001 |
The NIST Cryptographic Workshop on Hash Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 4(1), pp. 54-56, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
security, cryptanalysis, hash functions, SHA-1 |
36 | Thomas Peyrin, Henri Gilbert, Frédéric Muller, Matthew J. B. Robshaw |
Combining Compression Functions and Block Cipher-Based Hash Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings, pp. 315-331, 2006, Springer, 3-540-49475-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
block ciphers, hash functions, compression functions |
36 | Katsuyuki Okeya |
Side Channel Attacks Against HMACs Based on Block-Cipher Based Hash Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings, pp. 432-443, 2006, Springer, 3-540-35458-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
(keyed) hash function, PGV construction, reverse DPA, side channel attacks, differential power analysis (DPA), HMAC |
36 | Philip Garcia, Henry F. Korth |
Database hash-join algorithms on multithreaded computer architectures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Conf. Computing Frontiers ![In: Proceedings of the Third Conference on Computing Frontiers, 2006, Ischia, Italy, May 3-5, 2006, pp. 241-252, 2006, ACM, 1-59593-302-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
performance, database, multithreading, software pipelining, SMT, memory performance, software prefetching, hash-join |
36 | Daniel Joscák, Jirí Tuma |
Multi-block Collisions in Hash Functions Based on 3C and 3C+ Enhancements of the Merkle-Damgård Construction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2006, 9th International Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings, pp. 257-266, 2006, Springer, 3-540-49112-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
multi-block collision attack, 3C and 3C+ constructions, hash functions |
36 | Hui Gao, Jan Friso Groote, Wim H. Hesselink |
Lock-free dynamic hash tables with open addressing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Distributed Comput. ![In: Distributed Comput. 18(1), pp. 21-42, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Distributed algorithms, Wait-free, Lock-free, Hash tables |
36 | Iuon-Chang Lin, Min-Shiang Hwang, Chin-Chen Chang 0001 |
The General Pay-Word: A Micro-payment Scheme Based on n-dimension One-way Hash Chain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 36(1), pp. 53-67, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
one-way hash function, micro-payment |
Displaying result #101 - #200 of 7013 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ >>] |
|