The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Hash with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1968-1973 (17) 1974-1977 (20) 1978-1980 (18) 1981-1982 (16) 1983-1984 (19) 1985 (16) 1986-1987 (16) 1988-1989 (33) 1990 (33) 1991 (27) 1992 (38) 1993 (28) 1994 (44) 1995 (33) 1996 (36) 1997 (47) 1998 (42) 1999 (62) 2000 (56) 2001 (85) 2002 (139) 2003 (183) 2004 (329) 2005 (415) 2006 (468) 2007 (493) 2008 (494) 2009 (456) 2010 (240) 2011 (205) 2012 (223) 2013 (226) 2014 (182) 2015 (188) 2016 (241) 2017 (229) 2018 (227) 2019 (260) 2020 (232) 2021 (255) 2022 (304) 2023 (278) 2024 (60)
Publication types (Num. hits)
article(2517) book(3) incollection(69) inproceedings(4361) phdthesis(63)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 3717 occurrences of 1502 keywords

Results
Found 7025 publication records. Showing 7013 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
36Bo Yang 0010, Ramesh Karri Power optimization for universal hash function data path using divide-and-concatenate technique. Search on Bibsonomy CODES+ISSS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF divide-and-concatenate, power optimization, universal hash function
36Shoichi Hirose Provably Secure Double-Block-Length Hash Functions in a Black-Box Model. Search on Bibsonomy ICISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF block cipher, black-box model, double-block-length hash function
36Wei-Chi Ku, Chien-Ming Chen 0001, Hui-Lung Lee Weaknesses of Lee-Li-Hwang's hash-based password authentication scheme. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF hash function, password authentication, guessing attack, denial-of-service attack, stolen-verifier attack
36Alex Biryukov, Joseph Lano, Bart Preneel Cryptanalysis of the Alleged SecurID Hash Function. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Alleged SecurID Hash Function, Internal Collision, Vanishing Differential, Differential Cryptanalysis
36Toshihiko Matsuo, Kaoru Kurosawa On Parallel Hash Functions Based on Block-Cipher. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF block cipher, hash function
36Martin Dietzfelbinger, Philipp Woelfel Almost random graphs with simple hash functions. Search on Bibsonomy STOC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF uniform hashing, hash function, random graphs, cuckoo hashing
36Josep Domingo-Ferrer Mobile Agent Route Protection through Hash-Based Mechanisms. Search on Bibsonomy INDOCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF agent route protection, Mobile agent security, Merkle trees, hash collisions
36Tor Helleseth, Thomas Johansson 0001 Universal Hash Functions from Exponential Sums over Finite Fields and Galois Rings. Search on Bibsonomy CRYPTO The full citation details ... 1996 DBLP  DOI  BibTeX  RDF exponential sums, Galois rings, authentication codes, Universal hash functions
36Debrup Chakraborty, Palash Sarkar 0001 HCH: A New Tweakable Enciphering Scheme Using the Hash-Counter-Hash Approach. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
36Yasunobu Nohara, Sozo Inoue A secure and scalable identification for hash-based RFID systems using updatable pre-computation. Search on Bibsonomy WISEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF d-left hash table, hash-chain scheme, rfid, unlinkability
36Erik Dahmen, Christoph Krauß Short Hash-Based Signatures for Wireless Sensor Networks. Search on Bibsonomy CANS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF hash-based signature scheme, Winternitz one-time signature scheme, wireless sensor network, hash chain
36Dejan Raskovic, Emil Jovanov, Aleksandar Janicijevic, Veljko M. Milutinovic An implementation of hash based ATM router chip. Search on Bibsonomy HICSS (1) The full citation details ... 1995 DBLP  DOI  BibTeX  RDF ATM router chip, hash based, large size routing tables, hash-based hardware accelerator, standard RAM, asynchronous transfer mode, storage management, telecommunication network routing, file organisation, telecommunication computing, hardware support
35Goktug C. Ozmen, Mohsen Safaei, Beren Semiz, Daniel C. Whittingslow, Jennifer L. Hunnicutt, Sampath Prahalad, Regina Hash, John W. Xerogeanes, Omer T. Inan Detection of Meniscal Tear Effects on Tibial Vibration Using Passive Knee Sound Measurements. Search on Bibsonomy IEEE Trans. Biomed. Eng. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
35Melissa J. M. Turcotte, Alexander D. Kent, Curtis Hash Unified Host and Network Data Set. Search on Bibsonomy CoRR The full citation details ... 2017 DBLP  BibTeX  RDF
35Blake Anderson, Terran Lane, Curtis Hash Malware Phylogenetics Based on the Multiview Graphical Lasso. Search on Bibsonomy IDA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
35Michael E. Fisk, Curtis L. Hash Jr. FileMap: map-reduce program execution on loosely-coupled distributed systems. Search on Bibsonomy CloudDP@EuroSys The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
35Joshua Neil, Curtis L. Hash Jr., Alexander Brugh, Mike Fisk, Curtis B. Storlie Scan Statistics for the Online Detection of Locally Anomalous Subgraphs. Search on Bibsonomy Technometrics The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
35Jamie Coble, Pradeep Ramuhalli, Ryan Meyer, Hash Hashemian Online sensor calibration assessment in nuclear power systems. Search on Bibsonomy IEEE Instrum. Meas. Mag. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
35Magy Seif El-Nasr, Katherine Isbister, Jeffery Ventrella, Bardia Aghabeigi, Chelsea Hash, Mona Erfani, Jacquelyn Ford Morie, Leslie Bishko Body Buddies: Social Signaling through Puppeteering. Search on Bibsonomy HCI (14) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
35Chelsea Hash, Katherine Isbister Reactive animation and gameplay experience. Search on Bibsonomy FDG The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
35Moses Schwartz, Curtis Hash, Lorie M. Liebrock Term distribution visualizations with Focus+Context - Overview and usability evaluation. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
35Katherine Isbister, Mary Flanagan, Chelsea Hash Designing games for learning: insights from conversations with designers. Search on Bibsonomy CHI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF appreciation system, games and education, games for learning, design patterns, game design, design practice
35Moses Schwartz, Curtis Hash, Lorie M. Liebrock Term distribution visualizations with Focus+Context. Search on Bibsonomy SAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF visualization, information retrieval, Focus+Context, term distribution
35Vincent Urias, Curtis Hash, Lorie M. Liebrock Consideration of Issues for Parallel Digital Forensics of RAID Systems. Search on Bibsonomy J. Digit. Forensic Pract. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
35Patrick C. McGuire, Michael J. Wolff, Michael D. Smith 0003, Raymond E. Arvidson, Scott L. Murchie, R. Todd Clancy, Ted L. Roush, Selby C. Cull, Kim A. Lichtenberg, Sandra M. Wiseman, Robert O. Green, Terry Z. Martin, Ralph E. Milliken, Peter J. Cavender, David C. Humm, Frank P. Seelos, Kim D. Seelos, Howard W. Taylor, Bethany L. Ehlmann, John F. Mustard, Shannon M. Pelkey, Timothy N. Titus, Christopher D. Hash, Erick R. Malaret MRO/CRISM Retrieval of Surface Lambert Albedos for Multispectral Mapping of Mars With DISORT-Based Radiative Transfer Modeling: Phase 1 - Using Historical Climatology for Temperatures, Aerosol Optical Depths, and Atmospheric Pressures. Search on Bibsonomy IEEE Trans. Geosci. Remote. Sens. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
35Roberto K. Champney, Kay M. Stanney, Phillip A. K. Hash, Linda C. Malone, Robert S. Kennedy, Daniel E. Compton Recovery From Virtual Environment Exposure: Expected Time Course of Symptoms and Potential Readaptation Strategies. Search on Bibsonomy Hum. Factors The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
35B. Jayashree, Ramu Punna, P. Prasad, Kassahun Bantte, C. Tom Hash, Subhash Chandra, David A. Hoisington, Rajeev K. Varshney A Database of Simple Sequence Repeats from Cereal and Legume Expressed Sequence Tags Mined in silico: Survey and Evaluation. Search on Bibsonomy Silico Biol. The full citation details ... 2006 DBLP  BibTeX  RDF
35Patrick W. Fitzgibbons, Digen K. Das, Larry J. Hash SAFEMITS Distributed Services in Mobile Ad-Hoc Networks. Search on Bibsonomy ICN/ICONS/MCL The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
35Martin Hash, Robert Hiromoto, Scott Harrison 3D Animation Streaming. Search on Bibsonomy WEBIST (1) The full citation details ... 2006 DBLP  BibTeX  RDF
35Martin Hash, Jorge Luis Williams Maintaining Consistent 3D Display Rates with Splines. Search on Bibsonomy IMSA The full citation details ... 2005 DBLP  BibTeX  RDF
35Martin Hash, Noel Pickering, Daniel Tiedy, Niels Farragher Preloading and Precedence Lists for Smooth Playback of 3D Character Animation on the Internet. Search on Bibsonomy QSHINE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
35Mark Pesses, John Tan, Ryan Hash, Robert Swartz Simulation of LWIR Polarimetric Observations of Space Objects. Search on Bibsonomy AIPR The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
35Elizabeth Odekirk-Hash, Joseph L. Zachary Automated feedback on programs means students need less help from teachers. Search on Bibsonomy SIGCSE The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
35Kay M. Stanney, Phillip A. K. Hash Locus of User-Initiated Control in Virtual Environments: Influences on Cybersickness. Search on Bibsonomy Presence Teleoperators Virtual Environ. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
32Mikkel Thorup String hashing for linear probing. Search on Bibsonomy SODA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
32Yevgeniy Dodis, Krzysztof Pietrzak Improving the Security of MACs Via Randomized Message Preprocessing. Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
32Florian Mendel, Vincent Rijmen Weaknesses in the HAS-V Compression Function. Search on Bibsonomy ICISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
32Qihai Zhou, Chen Yongming, Hongyu Wu A New Algorithm Finding Frequent Itemsets Based on Minimum Separating into Buckets. Search on Bibsonomy IITA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
32Longjiang Yu, Sheng-He Sun Image Robust Hashing Based on DCT Sign. Search on Bibsonomy IIH-MSP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
32Shai Halevi, Hugo Krawczyk Strengthening Digital Signatures Via Randomized Hashing. Search on Bibsonomy CRYPTO The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
32Yu-En Lu, Steven Hand 0001, Pietro Liò Keyword Searching in Hypercubic Manifolds. Search on Bibsonomy Peer-to-Peer Computing The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
32Philipp Woelfel Efficient Strongly Universal and Optimally Universal Hashing. Search on Bibsonomy MFCS The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
32Jonathan D. Cohen 0002 Recursive Hashing Functions for n-Grams. Search on Bibsonomy ACM Trans. Inf. Syst. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF recursive hashing, hashing functions, hashing, n-grams
32Jean-Philippe Aumasson, Orr Dunkelman, Sebastiaan Indesteege, Bart Preneel Cryptanalysis of Dynamic SHA(2). Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Dynamic SHA, Dynamic SHA2, hash function, collision attack, SHA-3 candidate
32Fangyong Hou, Nong Xiao, Yuhua Tang, Hongjun He, Fang Liu 0002 Protect Disk Integrity: Solid Security, Fine Performance and Fast Recovery. Search on Bibsonomy ISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF hash tree, performance, integrity, consistency, disk
32Florian Mendel, Christian Rechberger, Martin Schläffer, Søren S. Thomsen The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Grøstl, Maelstrom, hash function, collision attack, Whirlpool, near-collision
32Akira Numayama, Keisuke Tanaka On the Weak Ideal Compression Functions. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF weak ideal compression function, indifferentiability, hash construction, random oracle
32Zoe Lin Jiang, Lucas Chi Kwong Hui, Siu-Ming Yiu Improving Disk Sector Integrity Using K-Dimension Hashing. (PDF / PS) Search on Bibsonomy IFIP Int. Conf. Digital Forensics The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Evidence integrity, k-dimension hashing, hard disks, hash values
32Mridul Nandi Two New Efficient CCA-Secure Online Ciphers: MHCBC and MCBC. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF online cipher, CBC, universal hash function, random permutation
32Christopher Marberry, Philip Craiger Factors Affecting One-Way Hashing of CD-R Media. (PDF / PS) Search on Bibsonomy IFIP Int. Conf. Digital Forensics The full citation details ... 2007 DBLP  DOI  BibTeX  RDF one-way hashing, CD-R media, Cryptographic hash functions
32Thomas Peyrin Cryptanalysis of Grindahl. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Grindahl, hash functions, Rijndael
32Krystian Matusiewicz, Thomas Peyrin, Olivier Billet, Scott Contini, Josef Pieprzyk Cryptanalysis of FORK-256. Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF FORK-256, micro-collisions, cryptanalysis, hash functions
32Duo Lei, Chao Li Extended Multi-Property-Preserving and ECM-Construction. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Merkle-Damgård, almost uniform distribution, Hash functions, random oracle, pseudo random function, collision resistance
32Mario Lamberger, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen Second Preimages for SMASH. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF SMASH, cryptanalysis, hash functions, second preimages
32Sylvain Lefebvre 0001, Hugues Hoppe Perfect spatial hashing. Search on Bibsonomy ACM Trans. Graph. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF 3D-parameterized textures, adaptive textures, minimal perfect hash, multidimensional hashing, sparse data, vector images
32John Kelsey, Stefan Lucks Collisions and Near-Collisions for Reduced-Round Tiger. Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF hash function, attack, collisions, Tiger
32Michael Szydlo, Yiqun Lisa Yin Collision-Resistant Usage of MD5 and SHA-1 Via Message Preprocessing. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF signature, MD5, SHA-1, padding, hash collision
32Yong Zhang 0023, Xiamu Niu, Juncao Li, Chun-ming Li Research on a Novel Hashing Stream Cipher. Search on Bibsonomy CIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Stream cipher, Information security, Hash function
32Qusai Abuein, Susumu Shibusawa Signature Amortization Using Multiple Connected Chains. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Multicast stream authentication, signature amortization, web security, hash chain
32Dijiang Huang, Deep Medhi A key-chain-based keying scheme for many-to-many secure group communication. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF key chain, many-to-many secure group communication, secure group communication, Hash chain
32Scott Lystig Fritchie A study of Erlang ETS table implementations and performance. Search on Bibsonomy Erlang Workshop The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Judy array, in-memory database, Erlang, B-tree, hash table, AVL tree
32Antoon Bosselaers, René Govaerts, Joos Vandewalle Fast Hashing on the Pentium. Search on Bibsonomy CRYPTO The full citation details ... 1996 DBLP  DOI  BibTeX  RDF Pentium processor, Parallel implementation, Software performance, Cryptographic hash functions
31Charles J. Colbourn, Alan C. H. Ling Linear hash families and forbidden configurations. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Mathematics Subject Classifications (2000) 05B15, 11T71, 05B30
31Djamal Belazzougui, Fabiano C. Botelho, Martin Dietzfelbinger Hash, Displace, and Compress. Search on Bibsonomy ESA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
31Alexandra Boldyreva, David Cash, Marc Fischlin, Bogdan Warinschi Foundations of Non-malleable Hash and One-Way Functions. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
31Yadan Deng, Ning Jing, Wei Xiong 0010, Chen Luo, Hongsheng Chen Hash Join Optimization Based on Shared Cache Chip Multi-processor. Search on Bibsonomy DASFAA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Radix-Join, Shared L2-Cache, Chip Multi-Processor, Cache Conflict
31Václav Snásel, Ajith Abraham, Jiri Dvorský, Pavel Krömer, Jan Platos Hash Functions Based on Large Quasigroups. Search on Bibsonomy ICCS (1) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
31Ray C. C. Cheung, Çetin Kaya Koç, John D. Villasenor A High-Performance Hardware Architecture for Spectral Hash Algorithm. Search on Bibsonomy ASAP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
31Xiaohong Wang, Aaron M. Smalter, Jun Huan, Gerald H. Lushington G-hash: towards fast kernel-based similarity search in large graph databases. Search on Bibsonomy EDBT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF k-NNs search, graph similarity query, hashing, graph kernels, graph classification
31Jiandong Liu, Shuhong Wang 0002, Youming Yu TDHA-A One-Way Hash Algorithm Based on Extended Integer Tent Maps with Dynamic Properties. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
31Bart Preneel The State of Hash Functions and the NIST SHA-3 Competition. Search on Bibsonomy Inscrypt The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
31Marc Fischlin, Anja Lehmann Multi-property Preserving Combiners for Hash Functions. Search on Bibsonomy TCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
31Yurong Song, Guoping Jiang Hash Function Construction Based on Chaotic Coupled Map Network. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
31Kave Eshghi, Shyamsundar Rajaram Locality sensitive hash functions based on concomitant rank order statistics. Search on Bibsonomy KDD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF concomitants, order statistics, locality sensitive hashing, image similarity
31Song Xu, Bo Zhang, Lin Zhang 0013, Yu Liu 0001 A fast and reliable decoding scheme with prior-hash bits in distributed video coding. Search on Bibsonomy Mobility Conference The full citation details ... 2008 DBLP  DOI  BibTeX  RDF distributed video coding, LDPC, wyner-ziv coding
31Mihir Bellare, Todor Ristov Hash Functions from Sigma Protocols and Improvements to VSH. Search on Bibsonomy ASIACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
31Yedidya Hilewitz, Yiqun Lisa Yin, Ruby B. Lee Accelerating the Whirlpool Hash Function Using Parallel Table Lookup and Fast Cyclical Permutation. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
31Olivier Billet, Matthew J. B. Robshaw, Yannick Seurin, Yiqun Lisa Yin Looking Back at a New Hash Function. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
31Jean-Philippe Aumasson, Raphael C.-W. Phan How (Not) to Efficiently Dither Blockcipher-Based Hash Functions?. Search on Bibsonomy AFRICACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
31Michael Westergaard, Lars Michael Kristensen, Gerth Stølting Brodal, Lars Arge The ComBack Method - Extending Hash Compaction with Backtracking. Search on Bibsonomy ICATPN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
31Noga Alon, Shai Gutner Balanced Families of Perfect Hash Functions and Their Applications. Search on Bibsonomy ICALP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF approximate counting of subgraphs, perfect hashing, color-coding
31Christina N. Michael, Xiao Su Incorporating a New Hash Function in OpenPGP and SSL/TLS. Search on Bibsonomy ITNG The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
31Marc Fischlin, Anja Lehmann Security-Amplifying Combiners for Collision-Resistant Hash Functions. Search on Bibsonomy CRYPTO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
31Ibrahim Cem Baykal, Graham A. Jullien On the Use of Hash Functions as Preprocessing Algorithms to Detect Defects on Repeating Definite Textures. Search on Bibsonomy Mach. Vis. Appl. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF In-camera, FPGA, Real-time, Segmentation, Defect detection, Camera network
31Philipp Woelfel Asymmetric balanced allocation with simple hash functions. Search on Bibsonomy SODA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
31Pengcheng Wei, Wei Zhang, Huaqian Yang, Jun Chen Combining RBF Neural Network and Chaotic Map to Construct Hash Function. Search on Bibsonomy ISNN (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
31Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang Higher Order Universal One-Way Hash Functions from the Subset Sum Assumption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
31Dan Boneh, Xavier Boyen On the Impossibility of Efficiently Combining Collision Resistant Hash Functions. Search on Bibsonomy CRYPTO The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
31Yu-Kuen Lai, Gregory T. Byrd Stream-Based Implementation of Hash Functions for Multi-Gigabit Message Authentication Codes. Search on Bibsonomy PDCAT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
31Daniel Augot, Matthieu Finiasz, Nicolas Sendrier A Family of Fast Syndrome Based Cryptographic Hash Functions. Search on Bibsonomy Mycrypt The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
31YongJie Wang, Yao Zhao 0001, Jeng-Shyang Pan 0001, ShaoWei Weng A Reversible Watermark Scheme Combined with Hash Function and Lossless Compression. Search on Bibsonomy KES (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
31Lars R. Knudsen SMASH - A Cryptographic Hash Function. Search on Bibsonomy FSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
31John Kelsey, Bruce Schneier Second Preimages on n-Bit Hash Functions for Much Less than 2n Work. Search on Bibsonomy EUROCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
31Haralambos Michail, Athanasios P. Kakarountas, Odysseas G. Koufopavlou, Constantinos E. Goutis A low-power and high-throughput implementation of the SHA-1 hash function. Search on Bibsonomy ISCAS (4) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
31Mridul Nandi Towards Optimal Double-Length Hash Functions. Search on Bibsonomy INDOCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
31Jean-Sébastien Coron, Yevgeniy Dodis, Cécile Malinaud, Prashant Puniya Merkle-Damgård Revisited: How to Construct a Hash Function. Search on Bibsonomy CRYPTO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
31Christian Schindelhauer, Gunnar Schomaker Weighted distributed hash tables. Search on Bibsonomy SPAA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF adaptive hashing, consistent hashing, non-uniform disks, peer-to-peer networks, web caching, storage area networks
31Jillian Cannons, Pierre Moulin Design and statistical analysis of a hash-aided image watermarking system. Search on Bibsonomy IEEE Trans. Image Process. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
31Dan Williams, Emin Gün Sirer Optimal Parameter Selection for Efficient Memory Integrity Verification Using Merkle Hash Trees. Search on Bibsonomy NCA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
31Fangyong Hou, Zhiying Wang, Yuhua Tang, Jifeng Liu Verify Memory Integrity Basing on Hash Tree and MAC Combined Approach. Search on Bibsonomy EUC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
Displaying result #201 - #300 of 7013 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license