|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 3717 occurrences of 1502 keywords
|
|
|
Results
Found 7025 publication records. Showing 7013 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
36 | Bo Yang 0010, Ramesh Karri |
Power optimization for universal hash function data path using divide-and-concatenate technique. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODES+ISSS ![In: Proceedings of the 3rd IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis, CODES+ISSS 2005, Jersey City, NJ, USA, September 19-21, 2005, pp. 219-224, 2005, ACM, 1-59593-161-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
divide-and-concatenate, power optimization, universal hash function |
36 | Shoichi Hirose |
Provably Secure Double-Block-Length Hash Functions in a Black-Box Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2004, 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers, pp. 330-342, 2004, Springer, 3-540-26226-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
block cipher, black-box model, double-block-length hash function |
36 | Wei-Chi Ku, Chien-Ming Chen 0001, Hui-Lung Lee |
Weaknesses of Lee-Li-Hwang's hash-based password authentication scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGOPS Oper. Syst. Rev. ![In: ACM SIGOPS Oper. Syst. Rev. 37(4), pp. 19-25, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
hash function, password authentication, guessing attack, denial-of-service attack, stolen-verifier attack |
36 | Alex Biryukov, Joseph Lano, Bart Preneel |
Cryptanalysis of the Alleged SecurID Hash Function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 10th Annual International Workshop, SAC 2003, Ottawa, Canada, August 14-15, 2003, Revised Papers, pp. 130-144, 2003, Springer, 3-540-21370-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Alleged SecurID Hash Function, Internal Collision, Vanishing Differential, Differential Cryptanalysis |
36 | Toshihiko Matsuo, Kaoru Kurosawa |
On Parallel Hash Functions Based on Block-Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003, Proceedings, pp. 510-521, 2003, Springer, 3-540-40515-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
block cipher, hash function |
36 | Martin Dietzfelbinger, Philipp Woelfel |
Almost random graphs with simple hash functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STOC ![In: Proceedings of the 35th Annual ACM Symposium on Theory of Computing, June 9-11, 2003, San Diego, CA, USA, pp. 629-638, 2003, ACM, 1-58113-674-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
uniform hashing, hash function, random graphs, cuckoo hashing |
36 | Josep Domingo-Ferrer |
Mobile Agent Route Protection through Hash-Based Mechanisms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2001, Second International Conference on Cryptology in India, Chennai, India, December 16-20, 2001, Proceedings, pp. 17-29, 2001, Springer, 3-540-43010-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
agent route protection, Mobile agent security, Merkle trees, hash collisions |
36 | Tor Helleseth, Thomas Johansson 0001 |
Universal Hash Functions from Exponential Sums over Finite Fields and Galois Rings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '96, 16th Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 1996, Proceedings, pp. 31-44, 1996, Springer, 3-540-61512-1. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
exponential sums, Galois rings, authentication codes, Universal hash functions |
36 | Debrup Chakraborty, Palash Sarkar 0001 |
HCH: A New Tweakable Enciphering Scheme Using the Hash-Counter-Hash Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Theory ![In: IEEE Trans. Inf. Theory 54(4), pp. 1683-1699, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
36 | Yasunobu Nohara, Sozo Inoue |
A secure and scalable identification for hash-based RFID systems using updatable pre-computation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Third ACM Conference on Wireless Network Security, WISEC 2010, Hoboken, New Jersey, USA, March 22-24, 2010, pp. 65-74, 2010, ACM, 978-1-60558-923-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
d-left hash table, hash-chain scheme, rfid, unlinkability |
36 | Erik Dahmen, Christoph Krauß |
Short Hash-Based Signatures for Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 8th International Conference, CANS 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings, pp. 463-476, 2009, Springer, 978-3-642-10432-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
hash-based signature scheme, Winternitz one-time signature scheme, wireless sensor network, hash chain |
36 | Dejan Raskovic, Emil Jovanov, Aleksandar Janicijevic, Veljko M. Milutinovic |
An implementation of hash based ATM router chip. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS (1) ![In: 28th Annual Hawaii International Conference on System Sciences (HICSS-28), January 3-6, 1995, Kihei, Maui, Hawaii, USA, pp. 32-40, 1995, IEEE Computer Society, 0-8186-6945-4. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
ATM router chip, hash based, large size routing tables, hash-based hardware accelerator, standard RAM, asynchronous transfer mode, storage management, telecommunication network routing, file organisation, telecommunication computing, hardware support |
35 | Goktug C. Ozmen, Mohsen Safaei, Beren Semiz, Daniel C. Whittingslow, Jennifer L. Hunnicutt, Sampath Prahalad, Regina Hash, John W. Xerogeanes, Omer T. Inan |
Detection of Meniscal Tear Effects on Tibial Vibration Using Passive Knee Sound Measurements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Biomed. Eng. ![In: IEEE Trans. Biomed. Eng. 68(7), pp. 2241-2250, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
35 | Melissa J. M. Turcotte, Alexander D. Kent, Curtis Hash |
Unified Host and Network Data Set. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1708.07518, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
35 | Blake Anderson, Terran Lane, Curtis Hash |
Malware Phylogenetics Based on the Multiview Graphical Lasso. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDA ![In: Advances in Intelligent Data Analysis XIII - 13th International Symposium, IDA 2014, Leuven, Belgium, October 30 - November 1, 2014. Proceedings, pp. 1-12, 2014, Springer, 978-3-319-12570-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
35 | Michael E. Fisk, Curtis L. Hash Jr. |
FileMap: map-reduce program execution on loosely-coupled distributed systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CloudDP@EuroSys ![In: Proceedings of the Fourth International Workshop on Cloud Data and Platforms, CloudDP@EuroSys 2014, Amsterdam, The Netherlands, April 13, 2014, pp. 6:1-6:6, 2014, ACM, 978-1-4503-2714-5. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
35 | Joshua Neil, Curtis L. Hash Jr., Alexander Brugh, Mike Fisk, Curtis B. Storlie |
Scan Statistics for the Online Detection of Locally Anomalous Subgraphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Technometrics ![In: Technometrics 55(4), pp. 403-414, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
35 | Jamie Coble, Pradeep Ramuhalli, Ryan Meyer, Hash Hashemian |
Online sensor calibration assessment in nuclear power systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Instrum. Meas. Mag. ![In: IEEE Instrum. Meas. Mag. 16(3), pp. 32-37, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
35 | Magy Seif El-Nasr, Katherine Isbister, Jeffery Ventrella, Bardia Aghabeigi, Chelsea Hash, Mona Erfani, Jacquelyn Ford Morie, Leslie Bishko |
Body Buddies: Social Signaling through Puppeteering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCI (14) ![In: Virtual and Mixed Reality - Systems and Applications - International Conference, Virtual and Mixed Reality 2011, Held as Part of HCI International 2011, Orlando, FL, USA, July 9-14, 2011, Proceedings, Part II, pp. 279-288, 2011, Springer, 978-3-642-22023-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
35 | Chelsea Hash, Katherine Isbister |
Reactive animation and gameplay experience. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FDG ![In: Foundations of Digital Games, FDG'11, Bordeaux, France, June 28 - July 1, 2011, pp. 328-330, 2011, ACM, 978-1-4503-0804-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
35 | Moses Schwartz, Curtis Hash, Lorie M. Liebrock |
Term distribution visualizations with Focus+Context - Overview and usability evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Tools Appl. ![In: Multim. Tools Appl. 50(3), pp. 509-532, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
35 | Katherine Isbister, Mary Flanagan, Chelsea Hash |
Designing games for learning: insights from conversations with designers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI ![In: Proceedings of the 28th International Conference on Human Factors in Computing Systems, CHI 2010, Atlanta, Georgia, USA, April 10-15, 2010, pp. 2041-2044, 2010, ACM, 978-1-60558-929-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
appreciation system, games and education, games for learning, design patterns, game design, design practice |
35 | Moses Schwartz, Curtis Hash, Lorie M. Liebrock |
Term distribution visualizations with Focus+Context. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), Honolulu, Hawaii, USA, March 9-12, 2009, pp. 1792-1799, 2009, ACM, 978-1-60558-166-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
visualization, information retrieval, Focus+Context, term distribution |
35 | Vincent Urias, Curtis Hash, Lorie M. Liebrock |
Consideration of Issues for Parallel Digital Forensics of RAID Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Digit. Forensic Pract. ![In: J. Digit. Forensic Pract. 2(4), pp. 196-208, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
35 | Patrick C. McGuire, Michael J. Wolff, Michael D. Smith 0003, Raymond E. Arvidson, Scott L. Murchie, R. Todd Clancy, Ted L. Roush, Selby C. Cull, Kim A. Lichtenberg, Sandra M. Wiseman, Robert O. Green, Terry Z. Martin, Ralph E. Milliken, Peter J. Cavender, David C. Humm, Frank P. Seelos, Kim D. Seelos, Howard W. Taylor, Bethany L. Ehlmann, John F. Mustard, Shannon M. Pelkey, Timothy N. Titus, Christopher D. Hash, Erick R. Malaret |
MRO/CRISM Retrieval of Surface Lambert Albedos for Multispectral Mapping of Mars With DISORT-Based Radiative Transfer Modeling: Phase 1 - Using Historical Climatology for Temperatures, Aerosol Optical Depths, and Atmospheric Pressures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Geosci. Remote. Sens. ![In: IEEE Trans. Geosci. Remote. Sens. 46(12), pp. 4020-4040, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
35 | Roberto K. Champney, Kay M. Stanney, Phillip A. K. Hash, Linda C. Malone, Robert S. Kennedy, Daniel E. Compton |
Recovery From Virtual Environment Exposure: Expected Time Course of Symptoms and Potential Readaptation Strategies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Hum. Factors ![In: Hum. Factors 49(3), pp. 491-506, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
35 | B. Jayashree, Ramu Punna, P. Prasad, Kassahun Bantte, C. Tom Hash, Subhash Chandra, David A. Hoisington, Rajeev K. Varshney |
A Database of Simple Sequence Repeats from Cereal and Legume Expressed Sequence Tags Mined in silico: Survey and Evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Silico Biol. ![In: Silico Biol. 6(6), pp. 607-620, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
35 | Patrick W. Fitzgibbons, Digen K. Das, Larry J. Hash |
SAFEMITS Distributed Services in Mobile Ad-Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICN/ICONS/MCL ![In: Fifth International Conference on Networking and the International Conference on Systems (ICN / ICONS / MCL 2006), 23-29 April 2006, Mauritius, pp. 196, 2006, IEEE Computer Society, 0-7695-2552-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
35 | Martin Hash, Robert Hiromoto, Scott Harrison |
3D Animation Streaming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WEBIST (1) ![In: WEBIST 2006, Proceedings of the Second International Conference on Web Information Systems and Technologies: Internet Technology / Web Interface and Applications, Setúbal, Portugal, April 11-13, 2006, pp. 457-460, 2006, INSTICC Press, 978-972-8865-46-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
35 | Martin Hash, Jorge Luis Williams |
Maintaining Consistent 3D Display Rates with Splines. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMSA ![In: Proceedings of the Ninth IASTED International Conference on Internet and Multimedia Systems and Applications (IMSA 2005), Honolulu, Hawaii, USA, August 15-17, 2005, pp. 326-330, 2005, IASTED/ACTA Press, 0-88986-510-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
35 | Martin Hash, Noel Pickering, Daniel Tiedy, Niels Farragher |
Preloading and Precedence Lists for Smooth Playback of 3D Character Animation on the Internet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
QSHINE ![In: 1st International Conference on Quality of Service in Heterogeneous Wired/Wireless Networks (QSHINE 2004), 18-20 October 2004, Dallas, TX, USA, pp. 314-318, 2004, IEEE Computer Society, 0-7695-2233-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
35 | Mark Pesses, John Tan, Ryan Hash, Robert Swartz |
Simulation of LWIR Polarimetric Observations of Space Objects. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AIPR ![In: 31st Applied Image Pattern Recognition Workshop (AIPR 2002), From Color to Hyperspectral: Advancements in Spectral Imagery Exploitation, 16-18 October 2002, Washington, D.C., USA, Proceedings, pp. 164-170, 2002, IEEE Computer Society, 0-7695-1863-X. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
35 | Elizabeth Odekirk-Hash, Joseph L. Zachary |
Automated feedback on programs means students need less help from teachers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCSE ![In: Proceedings of the 32rd SIGCSE Technical Symposium on Computer Science Education, SIGCSE 2001, Charlotte, North Carolina, USA, 2001, pp. 55-59, 2001, ACM, 1-58113-329-4. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
35 | Kay M. Stanney, Phillip A. K. Hash |
Locus of User-Initiated Control in Virtual Environments: Influences on Cybersickness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Presence Teleoperators Virtual Environ. ![In: Presence Teleoperators Virtual Environ. 7(5), pp. 447-459, 1998. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
32 | Mikkel Thorup |
String hashing for linear probing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SODA ![In: Proceedings of the Twentieth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2009, New York, NY, USA, January 4-6, 2009, pp. 655-664, 2009, SIAM, 978-0-89871-680-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
32 | Yevgeniy Dodis, Krzysztof Pietrzak |
Improving the Security of MACs Via Randomized Message Preprocessing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers, pp. 414-433, 2007, Springer, 978-3-540-74617-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
32 | Florian Mendel, Vincent Rijmen |
Weaknesses in the HAS-V Compression Function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2007, 10th International Conference, Seoul, Korea, November 29-30, 2007, Proceedings, pp. 335-345, 2007, Springer, 978-3-540-76787-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
32 | Qihai Zhou, Chen Yongming, Hongyu Wu |
A New Algorithm Finding Frequent Itemsets Based on Minimum Separating into Buckets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IITA ![In: Proceedings of the Workshop on Intelligent Information Technology Application, IITA 2007, Zhang Jiajie, China, December 2-3, 2007, pp. 38-42, 2007, IEEE Computer Society, 0-7695-3063-X. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
32 | Longjiang Yu, Sheng-He Sun |
Image Robust Hashing Based on DCT Sign. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IIH-MSP ![In: Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), Pasadena, California, USA, December 18-20, 2006, Proceedings, pp. 131-134, 2006, IEEE Computer Society, 0-7695-2745-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
32 | Shai Halevi, Hugo Krawczyk |
Strengthening Digital Signatures Via Randomized Hashing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2006, 26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006, Proceedings, pp. 41-59, 2006, Springer, 3-540-37432-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
32 | Yu-En Lu, Steven Hand 0001, Pietro Liò |
Keyword Searching in Hypercubic Manifolds. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Peer-to-Peer Computing ![In: Fifth IEEE International Conference on Peer-to-Peer Computing (P2P 2005), 31 August - 2 September 2005, Konstanz, Germany, pp. 150-151, 2005, IEEE Computer Society, 0-7695-2376-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
32 | Philipp Woelfel |
Efficient Strongly Universal and Optimally Universal Hashing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MFCS ![In: Mathematical Foundations of Computer Science 1999, 24th International Symposium, MFCS'99, Szklarska Poreba, Poland, September 6-10, 1999, Proceedings, pp. 262-272, 1999, Springer, 3-540-66408-4. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
32 | Jonathan D. Cohen 0002 |
Recursive Hashing Functions for n-Grams. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. ![In: ACM Trans. Inf. Syst. 15(3), pp. 291-320, 1997. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
recursive hashing, hashing functions, hashing, n-grams |
32 | Jean-Philippe Aumasson, Orr Dunkelman, Sebastiaan Indesteege, Bart Preneel |
Cryptanalysis of Dynamic SHA(2). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 16th Annual International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers, pp. 415-432, 2009, Springer, 978-3-642-05443-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Dynamic SHA, Dynamic SHA2, hash function, collision attack, SHA-3 candidate |
32 | Fangyong Hou, Nong Xiao, Yuhua Tang, Hongjun He, Fang Liu 0002 |
Protect Disk Integrity: Solid Security, Fine Performance and Fast Recovery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISA ![In: Advances in Information Security and Assurance, Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings, pp. 169-178, 2009, Springer, 978-3-642-02616-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
hash tree, performance, integrity, consistency, disk |
32 | Florian Mendel, Christian Rechberger, Martin Schläffer, Søren S. Thomsen |
The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 16th International Workshop, FSE 2009, Leuven, Belgium, February 22-25, 2009, Revised Selected Papers, pp. 260-276, 2009, Springer, 978-3-642-03316-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Grøstl, Maelstrom, hash function, collision attack, Whirlpool, near-collision |
32 | Akira Numayama, Keisuke Tanaka |
On the Weak Ideal Compression Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 14th Australasian Conference, ACISP 2009, Brisbane, Australia, July 1-3, 2009, Proceedings, pp. 232-248, 2009, Springer, 978-3-642-02619-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
weak ideal compression function, indifferentiability, hash construction, random oracle |
32 | Zoe Lin Jiang, Lucas Chi Kwong Hui, Siu-Ming Yiu |
Improving Disk Sector Integrity Using K-Dimension Hashing. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
IFIP Int. Conf. Digital Forensics ![In: Advances in Digital Forensics IV, Fourth Annual IFIP WG 11.9 Conference on Digital Forensics, Kyoto University, Kyoto, Japan, January 28-30, 2008, pp. 87-98, 2008, Springer, 978-0-387-84926-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Evidence integrity, k-dimension hashing, hard disks, hash values |
32 | Mridul Nandi |
Two New Efficient CCA-Secure Online Ciphers: MHCBC and MCBC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2008, 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings, pp. 350-362, 2008, Springer, 978-3-540-89753-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
online cipher, CBC, universal hash function, random permutation |
32 | Christopher Marberry, Philip Craiger |
Factors Affecting One-Way Hashing of CD-R Media. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
IFIP Int. Conf. Digital Forensics ![In: Advances in Digital Forensics III - IFIP International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, USA, January 28-31, 2007, pp. 149-161, 2007, Springer, 978-0-387-73741-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
one-way hashing, CD-R media, Cryptographic hash functions |
32 | Thomas Peyrin |
Cryptanalysis of Grindahl. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings, pp. 551-567, 2007, Springer, 978-3-540-76899-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Grindahl, hash functions, Rijndael |
32 | Krystian Matusiewicz, Thomas Peyrin, Olivier Billet, Scott Contini, Josef Pieprzyk |
Cryptanalysis of FORK-256. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers, pp. 19-38, 2007, Springer, 978-3-540-74617-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
FORK-256, micro-collisions, cryptanalysis, hash functions |
32 | Duo Lei, Chao Li |
Extended Multi-Property-Preserving and ECM-Construction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2007, 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings, pp. 361-372, 2007, Springer, 978-3-540-77025-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Merkle-Damgård, almost uniform distribution, Hash functions, random oracle, pseudo random function, collision resistance |
32 | Mario Lamberger, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen |
Second Preimages for SMASH. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2007, The Cryptographers' Track at the RSA Conference 2007, San Francisco, CA, USA, February 5-9, 2007, Proceedings, pp. 101-111, 2007, Springer, 3-540-69327-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
SMASH, cryptanalysis, hash functions, second preimages |
32 | Sylvain Lefebvre 0001, Hugues Hoppe |
Perfect spatial hashing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Graph. ![In: ACM Trans. Graph. 25(3), pp. 579-588, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
3D-parameterized textures, adaptive textures, minimal perfect hash, multidimensional hashing, sparse data, vector images |
32 | John Kelsey, Stefan Lucks |
Collisions and Near-Collisions for Reduced-Round Tiger. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 13th International Workshop, FSE 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers, pp. 111-125, 2006, Springer, 3-540-36597-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
hash function, attack, collisions, Tiger |
32 | Michael Szydlo, Yiqun Lisa Yin |
Collision-Resistant Usage of MD5 and SHA-1 Via Message Preprocessing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2006, The Cryptographers' Track at the RSA Conference 2006, San Jose, CA, USA, February 13-17, 2006, Proceedings, pp. 99-114, 2006, Springer, 3-540-31033-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
signature, MD5, SHA-1, padding, hash collision |
32 | Yong Zhang 0023, Xiamu Niu, Juncao Li, Chun-ming Li |
Research on a Novel Hashing Stream Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Computational Intelligence and Security, International Conference, CIS 2006, Guangzhou, China, November 3-6, 2006, Revised Selected Papers, pp. 481-490, 2006, Springer, 978-3-540-74376-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Stream cipher, Information security, Hash function |
32 | Qusai Abuein, Susumu Shibusawa |
Signature Amortization Using Multiple Connected Chains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Communications and Multimedia Security ![In: Communications and Multimedia Security, 9th IFIP TC-6 TC-11 International Conference, CMS 2005, Salzburg, Austria, September 19-21, 2005, Proceedings, pp. 65-76, 2005, Springer, 3-540-28791-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Multicast stream authentication, signature amortization, web security, hash chain |
32 | Dijiang Huang, Deep Medhi |
A key-chain-based keying scheme for many-to-many secure group communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 7(4), pp. 523-552, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
key chain, many-to-many secure group communication, secure group communication, Hash chain |
32 | Scott Lystig Fritchie |
A study of Erlang ETS table implementations and performance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Erlang Workshop ![In: Proceedings of the 2003 ACM SIGPLAN Workshop on Erlang, Uppsala, Sweden, August 29, 2003, pp. 43-55, 2003, ACM, 1-58113-772-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Judy array, in-memory database, Erlang, B-tree, hash table, AVL tree |
32 | Antoon Bosselaers, René Govaerts, Joos Vandewalle |
Fast Hashing on the Pentium. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '96, 16th Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 1996, Proceedings, pp. 298-312, 1996, Springer, 3-540-61512-1. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
Pentium processor, Parallel implementation, Software performance, Cryptographic hash functions |
31 | Charles J. Colbourn, Alan C. H. Ling |
Linear hash families and forbidden configurations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 52(1), pp. 25-55, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Mathematics Subject Classifications (2000) 05B15, 11T71, 05B30 |
31 | Djamal Belazzougui, Fabiano C. Botelho, Martin Dietzfelbinger |
Hash, Displace, and Compress. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESA ![In: Algorithms - ESA 2009, 17th Annual European Symposium, Copenhagen, Denmark, September 7-9, 2009. Proceedings, pp. 682-693, 2009, Springer, 978-3-642-04127-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
31 | Alexandra Boldyreva, David Cash, Marc Fischlin, Bogdan Warinschi |
Foundations of Non-malleable Hash and One-Way Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings, pp. 524-541, 2009, Springer, 978-3-642-10365-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
31 | Yadan Deng, Ning Jing, Wei Xiong 0010, Chen Luo, Hongsheng Chen |
Hash Join Optimization Based on Shared Cache Chip Multi-processor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DASFAA ![In: Database Systems for Advanced Applications, 14th International Conference, DASFAA 2009, Brisbane, Australia, April 21-23, 2009. Proceedings, pp. 293-307, 2009, Springer, 978-3-642-00886-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Radix-Join, Shared L2-Cache, Chip Multi-Processor, Cache Conflict |
31 | Václav Snásel, Ajith Abraham, Jiri Dvorský, Pavel Krömer, Jan Platos |
Hash Functions Based on Large Quasigroups. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCS (1) ![In: Computational Science - ICCS 2009, 9th International Conference, Baton Rouge, LA, USA, May 25-27, 2009, Proceedings, Part I, pp. 521-529, 2009, Springer, 978-3-642-01969-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
31 | Ray C. C. Cheung, Çetin Kaya Koç, John D. Villasenor |
A High-Performance Hardware Architecture for Spectral Hash Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASAP ![In: 20th IEEE International Conference on Application-Specific Systems, Architectures and Processors, ASAP 2009, July 7-9, 2009, Boston, MA, USA, pp. 215-218, 2009, IEEE Computer Society, 978-0-7695-3732-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
31 | Xiaohong Wang, Aaron M. Smalter, Jun Huan, Gerald H. Lushington |
G-hash: towards fast kernel-based similarity search in large graph databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDBT ![In: EDBT 2009, 12th International Conference on Extending Database Technology, Saint Petersburg, Russia, March 24-26, 2009, Proceedings, pp. 472-480, 2009, ACM, 978-1-60558-422-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
k-NNs search, graph similarity query, hashing, graph kernels, graph classification |
31 | Jiandong Liu, Shuhong Wang 0002, Youming Yu |
TDHA-A One-Way Hash Algorithm Based on Extended Integer Tent Maps with Dynamic Properties. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISECS ![In: Proceedings of The International Symposium on Electronic Commerce and Security, ISECS 2008, August 3-5, 2008, Guangzhou, China, pp. 432-436, 2008, IEEE Computer Society, 978-0-7695-3258-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Bart Preneel |
The State of Hash Functions and the NIST SHA-3 Competition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers, pp. 1-11, 2008, Springer, 978-3-642-01439-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Marc Fischlin, Anja Lehmann |
Multi-property Preserving Combiners for Hash Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography, Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008., pp. 375-392, 2008, Springer, 978-3-540-78523-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Yurong Song, Guoping Jiang |
Hash Function Construction Based on Chaotic Coupled Map Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICYCS ![In: Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008, Zhang Jia Jie, Hunan, China, November 18-21, 2008, pp. 2753-2758, 2008, IEEE Computer Society, 978-0-7695-3398-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Kave Eshghi, Shyamsundar Rajaram |
Locality sensitive hash functions based on concomitant rank order statistics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD ![In: Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Las Vegas, Nevada, USA, August 24-27, 2008, pp. 221-229, 2008, ACM, 978-1-60558-193-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
concomitants, order statistics, locality sensitive hashing, image similarity |
31 | Song Xu, Bo Zhang, Lin Zhang 0013, Yu Liu 0001 |
A fast and reliable decoding scheme with prior-hash bits in distributed video coding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mobility Conference ![In: Proceedings of the 5th International Conference on Mobile Technology, Applications, and Systems, Mobility Conference 2008, Yilan, Taiwan, September 10-12, 2008, pp. 43, 2008, ACM, 978-1-60558-089-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
distributed video coding, LDPC, wyner-ziv coding |
31 | Mihir Bellare, Todor Ristov |
Hash Functions from Sigma Protocols and Improvements to VSH. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings, pp. 125-142, 2008, Springer, 978-3-540-89254-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Yedidya Hilewitz, Yiqun Lisa Yin, Ruby B. Lee |
Accelerating the Whirlpool Hash Function Using Parallel Table Lookup and Fast Cyclical Permutation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers, pp. 173-188, 2008, Springer, 978-3-540-71038-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Olivier Billet, Matthew J. B. Robshaw, Yannick Seurin, Yiqun Lisa Yin |
Looking Back at a New Hash Function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings, pp. 239-253, 2008, Springer, 978-3-540-69971-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Jean-Philippe Aumasson, Raphael C.-W. Phan |
How (Not) to Efficiently Dither Blockcipher-Based Hash Functions?. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AFRICACRYPT ![In: Progress in Cryptology - AFRICACRYPT 2008, First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedings, pp. 308-324, 2008, Springer, 978-3-540-68159-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Michael Westergaard, Lars Michael Kristensen, Gerth Stølting Brodal, Lars Arge |
The ComBack Method - Extending Hash Compaction with Backtracking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICATPN ![In: Petri Nets and Other Models of Concurrency - ICATPN 2007, 28th International Conference on Applications and Theory of Petri Nets and Other Models of Concurrency, ICATPN 2007, Siedlce, Poland, June 25-29, 2007, Proceedings, pp. 445-464, 2007, Springer, 978-3-540-73093-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
31 | Noga Alon, Shai Gutner |
Balanced Families of Perfect Hash Functions and Their Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICALP ![In: Automata, Languages and Programming, 34th International Colloquium, ICALP 2007, Wroclaw, Poland, July 9-13, 2007, Proceedings, pp. 435-446, 2007, Springer, 978-3-540-73419-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
approximate counting of subgraphs, perfect hashing, color-coding |
31 | Christina N. Michael, Xiao Su |
Incorporating a New Hash Function in OpenPGP and SSL/TLS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2-4 April 2007, Las Vegas, Nevada, USA, pp. 556-561, 2007, IEEE Computer Society, 978-0-7695-2776-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
31 | Marc Fischlin, Anja Lehmann |
Security-Amplifying Combiners for Collision-Resistant Hash Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2007, 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings, pp. 224-243, 2007, Springer, 978-3-540-74142-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
31 | Ibrahim Cem Baykal, Graham A. Jullien |
On the Use of Hash Functions as Preprocessing Algorithms to Detect Defects on Repeating Definite Textures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mach. Vis. Appl. ![In: Mach. Vis. Appl. 17(3), pp. 185-195, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
In-camera, FPGA, Real-time, Segmentation, Defect detection, Camera network |
31 | Philipp Woelfel |
Asymmetric balanced allocation with simple hash functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SODA ![In: Proceedings of the Seventeenth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2006, Miami, Florida, USA, January 22-26, 2006, pp. 424-433, 2006, ACM Press, 0-89871-605-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
31 | Pengcheng Wei, Wei Zhang, Huaqian Yang, Jun Chen |
Combining RBF Neural Network and Chaotic Map to Construct Hash Function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISNN (2) ![In: Advances in Neural Networks - ISNN 2006, Third International Symposium on Neural Networks, Chengdu, China, May 28 - June 1, 2006, Proceedings, Part III, pp. 332-339, 2006, Springer, 3-540-34482-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
31 | Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang |
Higher Order Universal One-Way Hash Functions from the Subset Sum Assumption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings, pp. 157-173, 2006, Springer, 3-540-33851-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
31 | Dan Boneh, Xavier Boyen |
On the Impossibility of Efficiently Combining Collision Resistant Hash Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2006, 26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006, Proceedings, pp. 570-583, 2006, Springer, 3-540-37432-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
31 | Yu-Kuen Lai, Gregory T. Byrd |
Stream-Based Implementation of Hash Functions for Multi-Gigabit Message Authentication Codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PDCAT ![In: Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT 2006), 4-7 December 2006, Taipei, Taiwan, pp. 150-155, 2006, IEEE Computer Society, 0-7695-2736-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
31 | Daniel Augot, Matthieu Finiasz, Nicolas Sendrier |
A Family of Fast Syndrome Based Cryptographic Hash Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mycrypt ![In: Progress in Cryptology - Mycrypt 2005, First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings, pp. 64-83, 2005, Springer, 3-540-28938-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
31 | YongJie Wang, Yao Zhao 0001, Jeng-Shyang Pan 0001, ShaoWei Weng |
A Reversible Watermark Scheme Combined with Hash Function and Lossless Compression. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (2) ![In: Knowledge-Based Intelligent Information and Engineering Systems, 9th International Conference, KES 2005, Melbourne, Australia, September 14-16, 2005, Proceedings, Part II, pp. 1168-1174, 2005, Springer, 3-540-28895-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
31 | Lars R. Knudsen |
SMASH - A Cryptographic Hash Function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption: 12th International Workshop, FSE 2005, Paris, France, February 21-23, 2005, Revised Selected Papers, pp. 228-242, 2005, Springer, 3-540-26541-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
31 | John Kelsey, Bruce Schneier |
Second Preimages on n-Bit Hash Functions for Much Less than 2n Work. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings, pp. 474-490, 2005, Springer, 3-540-25910-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
31 | Haralambos Michail, Athanasios P. Kakarountas, Odysseas G. Koufopavlou, Constantinos E. Goutis |
A low-power and high-throughput implementation of the SHA-1 hash function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS (4) ![In: International Symposium on Circuits and Systems (ISCAS 2005), 23-26 May 2005, Kobe, Japan, pp. 4086-4089, 2005, IEEE, 0-7803-8834-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
31 | Mridul Nandi |
Towards Optimal Double-Length Hash Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2005, 6th International Conference on Cryptology in India, Bangalore, India, December 10-12, 2005, Proceedings, pp. 77-89, 2005, Springer, 3-540-30805-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
31 | Jean-Sébastien Coron, Yevgeniy Dodis, Cécile Malinaud, Prashant Puniya |
Merkle-Damgård Revisited: How to Construct a Hash Function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings, pp. 430-448, 2005, Springer, 3-540-28114-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
31 | Christian Schindelhauer, Gunnar Schomaker |
Weighted distributed hash tables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPAA ![In: SPAA 2005: Proceedings of the 17th Annual ACM Symposium on Parallelism in Algorithms and Architectures, July 18-20, 2005, Las Vegas, Nevada, USA, pp. 218-227, 2005, ACM, 1-58113-986-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
adaptive hashing, consistent hashing, non-uniform disks, peer-to-peer networks, web caching, storage area networks |
31 | Jillian Cannons, Pierre Moulin |
Design and statistical analysis of a hash-aided image watermarking system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Image Process. ![In: IEEE Trans. Image Process. 13(10), pp. 1393-1408, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
31 | Dan Williams, Emin Gün Sirer |
Optimal Parameter Selection for Efficient Memory Integrity Verification Using Merkle Hash Trees. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NCA ![In: 3rd IEEE International Symposium on Network Computing and Applications (NCA 2004), 30 August - 1 September 2004, Cambridge, MA, USA, pp. 383-388, 2004, IEEE Computer Society, 0-7695-2242-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
31 | Fangyong Hou, Zhiying Wang, Yuhua Tang, Jifeng Liu |
Verify Memory Integrity Basing on Hash Tree and MAC Combined Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC ![In: Embedded and Ubiquitous Computing, International Conference EUC 2004, Aizu-Wakamatsu City, Japan, August 25-27, 2004, Proceedings, pp. 869-878, 2004, Springer, 3-540-22906-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
Displaying result #201 - #300 of 7013 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ >>] |
|