The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Hash with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1968-1973 (17) 1974-1977 (20) 1978-1980 (18) 1981-1982 (16) 1983-1984 (19) 1985 (16) 1986-1987 (16) 1988-1989 (33) 1990 (33) 1991 (27) 1992 (38) 1993 (28) 1994 (44) 1995 (33) 1996 (36) 1997 (47) 1998 (42) 1999 (62) 2000 (56) 2001 (85) 2002 (139) 2003 (183) 2004 (329) 2005 (415) 2006 (468) 2007 (493) 2008 (494) 2009 (456) 2010 (240) 2011 (205) 2012 (223) 2013 (226) 2014 (182) 2015 (188) 2016 (241) 2017 (229) 2018 (227) 2019 (260) 2020 (232) 2021 (255) 2022 (304) 2023 (278) 2024 (60)
Publication types (Num. hits)
article(2517) book(3) incollection(69) inproceedings(4361) phdthesis(63)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 3717 occurrences of 1502 keywords

Results
Found 7025 publication records. Showing 7013 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
31Tim Grembowski, Roar Lien, Kris Gaj, Nghi Nguyen, Peter Bellows, Jaroslav Flidr, Tom Lehman, Brian Schott Comparative Analysis of the Hardware Implementations of Hash Functions SHA-1 and SHA-512. Search on Bibsonomy ISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
31Daewan Han, Sangwoo Park, Seongtaek Chee Cryptanalysis of the Modified Version of the Hash Function Proposed at PKC'98. Search on Bibsonomy FSE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
31Ibrahim Cem Baykal, Roberto Muscedere, Graham A. Jullien On the use of hash functions for defect detection in textures for in-camera web inspection systems. Search on Bibsonomy ISCAS (5) The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
31Jean-Sébastien Coron Security Proof for Partial-Domain Hash Signature Schemes. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Provable Security, Random Oracle Model, Signature Schemes
31Maged M. Michael High performance dynamic lock-free hash tables and list-based sets. Search on Bibsonomy SPAA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
31Yong-Cong Chen, Long-Wen Chang A secure and robust digital watermarking technique by the block cipher RC6 and secure hash algorithm. Search on Bibsonomy ICIP (2) The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
31Václav Skala, Martin Kuchar The Hash Function and the Principle of Duality. Search on Bibsonomy Computer Graphics International The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
31Ilya Mironov Hash Functions: From Merkle-Damgård to Shoup. Search on Bibsonomy EUROCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
31Victor Shoup A Composition Theorem for Universal One-Way Hash Functions. Search on Bibsonomy EUROCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
31Koutarou Suzuki, Kunio Kobayashi, Hikaru Morita Efficient Sealed-Bid Auction Using Hash Chain. Search on Bibsonomy ICISC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
31Noga Alon, Martin Dietzfelbinger, Peter Bro Miltersen, Erez Petrank, Gábor Tardos Linear Hash Functions. Search on Bibsonomy J. ACM The full citation details ... 1999 DBLP  DOI  BibTeX  RDF hashing via linear maps, universal hashing
31William Aiello, Stuart Haber, Ramarathnam Venkatesan New Constructions for Secure Hash Functions. Search on Bibsonomy FSE The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
31Ran Canetti Towards Realizing Random Oracles: Hash Functions That Hide All Partial Information. Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
31Chengwen Liu, Hao Chen 0009 A Hash Partition Strategy for Distributed Query Processing. Search on Bibsonomy EDBT The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
31Paul C. van Oorschot, Michael J. Wiener Parallel Collision Search with Application to Hash Functions and Discrete Logarithms. Search on Bibsonomy CCS The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
31HweeHwa Pang, Michael J. Carey 0001, Miron Livny Partially Preemptive Hash Joins. Search on Bibsonomy SIGMOD Conference The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
31Curd Engelmann, Jörg Keller 0001 Simulation-based Comparison of Hash Functions for Emulated Shared Memory. Search on Bibsonomy PARLE The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
31Claus-Peter Schnorr FFT-Hash II, Efficient Cryptographic Hashing. Search on Bibsonomy EUROCRYPT The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
31Serge Vaudenay FFT-Hash-II is not yet Collision-free. Search on Bibsonomy CRYPTO The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
31Marina Blanton, Mikhail J. Atallah Provable bounds for portable and flexible privacy-preserving access. Search on Bibsonomy SACMAT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF compact policy representation, minimal perfect hash functions, order-preserving minimal perfect hash functions, portable access rights, algorithm analysis
31Josep Domingo-Ferrer, Jordi Herrera-Joancomartí Spending Programs: A Tool for Flexible Micropayments. Search on Bibsonomy ISW The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Spending program, Electronic commerce, Hash functions, Hash chain, Micropayments
31Dmitry Khovratovich Cryptanalysis of Hash Functions with Structures. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF truncated differentials, Grindahl, Fugue, cryptanalysis, hash functions, structures, SHA-3
31Miroslav Knezevic, Ingrid Verbauwhede Hardware evaluation of the Luffa hash family. Search on Bibsonomy WESS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Luffa hash algorithm, SHA-3 competition, ASIC implementations
31Ewan Fleischmann, Michael Gorski, Stefan Lucks Security of Cyclic Double Block Length Hash Functions. Search on Bibsonomy IMACC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF block cipher based, double-block length, Cyclic-DM, Abreast-DM, cryptographic hash function, ideal cipher model, proof of security
31Ye-In Chang, Jiun-Rung Chen, Min-Tze Hsu A Hash Trie Filter Approach to Approximate String Matching for Genomic Databases. Search on Bibsonomy IEA/AIE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF hash trie, filter, Approximate string matching
31Martin Dietzfelbinger, Ulf Schellbach Weaknesses of Cuckoo Hashing with a Simple Universal Hash Class: The Case of Large Universes. Search on Bibsonomy SOFSEM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF universal hash classes, data structures, lower bounds, randomized algorithms, cuckoo hashing
31María Isabel González Vasco, Jorge Luis Villar In search of mathematical primitives for deriving universal projective hash families. Search on Bibsonomy Appl. Algebra Eng. Commun. Comput. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Projective hash families, Provable security, Public key encryption
31Xiaoxun Sun, Min Li, Hua Wang 0002, Ashley W. Plank An efficient hash-based algorithm for minimal k-anonymity. Search on Bibsonomy ACSC The full citation details ... 2008 DBLP  BibTeX  RDF hash-based algorithm, microdata release, k-anonymity
31Sándor Juhász Large-Scale Data Dictionaries Based on Hash Tables. Search on Bibsonomy IDC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF large data dictionaries, cache, performance optimization, hash table
31Pin Lin, Wenling Wu, Chuankun Wu, Tian Qiu Analysis of Zipper as a Hash Function. Search on Bibsonomy ISPEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Hash Function, Compression Function, Zipper
31Pierre-Alain Fouque, Gaëtan Leurent Cryptanalysis of a Hash Function Based on Quasi-cyclic Codes. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF cryptanalysis, hash function, provable security, syndrome decoding, quasi-cyclic code
31Matthew Henricksen, Lars R. Knudsen Cryptanalysis of the CRUSH Hash Function. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF CRUSH, Iterated Halving, Cryptanalysis, Hash Functions, Collisions, Second preimages
31YoungGyo Lee, Jeonghee Ahn, Seungjoo Kim, Dongho Won A Countermeasure of Fake Root Key Installation Using One-Time Hash Chain. Search on Bibsonomy KES-AMSTA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF root public key, publisher of the browser, applet provider, applet distribution agent, web browser, hash chain
31Antoine Joux, Thomas Peyrin Hash Functions and the (Amplified) Boomerang Attack. Search on Bibsonomy CRYPTO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF hash functions, SHA-1, boomerang attack
31Zongwei Zhou, Yibo Xue, Junda Liu, Wei Zhang, Jun Li 0003 MDH: A High Speed Multi-phase Dynamic Hash String Matching Algorithm for Large-Scale Pattern Set. Search on Bibsonomy ICICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF String Matching Algorithm, Multi-Phases Hash, Dynamic-Cut Heuristics, Network Security
31Ori Shalev, Nir Shavit Split-ordered lists: Lock-free extensible hash tables. Search on Bibsonomy J. ACM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF non-blocking synchronization, hash table, compare-and-swap, Concurrent data structures
31Konstantinos Chalkias, George Stephanides Timed Release Cryptography from Bilinear Pairings Using Hash Chains. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Timed-Release Cryptography, S/Key, bilinear pairings, hash chains, sealed-bid auctions
31Lawrence Cheng, Roel Ocampo, Kerry Jean, Alex Galis, Csaba Simon, Róbert Szabó, Peter Kersch, Raffaele Giaffreda Towards Distributed Hash Tables (De)Composition in Ambient Networks. Search on Bibsonomy DSOM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Composition, Distributed Hash Tables, Decomposition, Ambient Networks
31Aekyung Moon, Haengrae Cho Parallel Hash Join Algorithms for Dynamic Load Balancing in a Shared Disks Cluster. Search on Bibsonomy ICCSA (5) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF load balancing, Cluster computing, hash join, shared disks
31Jia Zhai, Chang Mok Park, Gi-Nam Wang Hash-Based RFID Security Protocol Using Randomly Key-Changed Identification Procedure. Search on Bibsonomy ICCSA (4) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Randomly Key-Changed Identification, Hash Functions, Security Protocol, RFID (Radio Frequency Identification)
31Sriram Ramabhadran, Sylvia Ratnasamy, Joseph M. Hellerstein, Scott Shenker Brief announcement: prefix hash tree. Search on Bibsonomy PODC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF data structures, distributed hash tables, range queries
31Fabius Klemm, Anwitaman Datta, Karl Aberer A Query-Adaptive Partial Distributed Hash Table for Peer-to-Peer Systems. Search on Bibsonomy EDBT Workshops The full citation details ... 2004 DBLP  DOI  BibTeX  RDF partial distributed hash table (PDHT), query-adaptive indexing, metadata, peer-to-peer (P2P)
31Simon N. Foley Using Trust Management to Support Transferable Hash-Based Micropayments. Search on Bibsonomy Financial Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Trust Management, Delegation, Public Key Certificates, One-way Hash Functions, Digital Cash
31Pinakpani Pal, Palash Sarkar 0001 PARSHA-256- - A New Parallelizable Hash Function and a Multithreaded Implementation. Search on Bibsonomy FSE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF parallel algorithm, hash function, binary tree, SHA-256
31Kun-Lung Wu, Philip S. Yu Load Balancing and Hot Spot Relief for Hash Routing among a Collection of Proxy Caches. Search on Bibsonomy ICDCS The full citation details ... 1999 DBLP  DOI  BibTeX  RDF adaptable controlled replication, hot spot relief, CARP, hash routing, load balancing
30Debrup Chakraborty, Palash Sarkar 0001 HCH: A New Tweakable Enciphering Scheme Using the Hash-Encrypt-Hash Approach. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
30Joan Daemen, Antoon Bosselaers, René Govaerts, Joos Vandewalle Collisions for Schnorr's Hash Function FFT-Hash Presented at Crypto '91. Search on Bibsonomy ASIACRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
30Ming-Syan Chen, Philip S. Yu Optimal Design of Multiple Hash Tables for Concurrency Control. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF hash algorithms, multiple hash tables, Concurrency control, lock contentions
30Maurizio Panti, Salvatore Valenti A modulus oriented hash function for the construction of minimal perfect tables. Search on Bibsonomy ACM SIGPLAN Notices The full citation details ... 1992 DBLP  DOI  BibTeX  RDF minimal hash tables, hash tables, perfect hashing functions
30J. D. Beyer, Ward Douglas Maurer, Frank K. Bamberger Letters to the editor: Comments on "An Improved Hash Code for Scatter Storage". Search on Bibsonomy Commun. ACM The full citation details ... 1968 DBLP  DOI  BibTeX  RDF searching, hash table, hash code, scatter storage
30W. D. Maurer An Improved Hash Code for Scatter Storage. Search on Bibsonomy Commun. ACM The full citation details ... 1968 DBLP  DOI  BibTeX  RDF searching, hash table, hash code, scatter storage
30Miraz Uz Zaman, Tong Shen, Manki Min Hash Vine: A New Hash Structure for Scalable Generation of Hierarchical Hash Codes. Search on Bibsonomy SysCon The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
30Xiangyang Gou, Chenxingyu Zhao, Tong Yang 0003, Lei Zou 0001, Yang Zhou 0008, Yibo Yan, Xiaoming Li 0001, Bin Cui 0001 Single Hash: Use One Hash Function to Build Faster Hash Based Data Structures. Search on Bibsonomy BigComp The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
30Kimmo Halunen Hash function security:cryptanalysis of the Very Smooth Hash and multicollisions in generalised iterated hash functions. Search on Bibsonomy 2012   RDF
27Yevgeniy Dodis, Thomas Ristenpart, Thomas Shrimpton Salvaging Merkle-Damgård for Practical Applications. Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
27Michel Abdalla, Céline Chevalier, David Pointcheval Smooth Projective Hashing for Conditionally Extractable Commitments. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
27Marco Tagliasacchi, Giuseppe Valenzise, Stefano Tubaro Localization of sparse image tampering via random projections. Search on Bibsonomy ICIP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Mario Mense, Christian Scheideler SPREAD: an adaptive scheme for redundant and fair storage in dynamic heterogeneous storage systems. Search on Bibsonomy SODA The full citation details ... 2008 DBLP  BibTeX  RDF
27Haibin Lu, Sartaj Sahni O(logW) multidimensional packet classification. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF binary search on levels, expected complexity, multidimensional packet classification
27Emmanuel Bresson, Dario Catalano, Rosario Gennaro Improved On-Line/Off-Line Threshold Signatures. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Phillip G. Bradford, Daniel A. Ray Using Digital Chains of Custody on Constrained Devices to Verify Evidence. Search on Bibsonomy ISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Vishal Monga, Arindam Banerjee 0001, Brian L. Evans A clustering based approach to perceptual image hashing. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Jing Deng 0002, Richard Han 0001, Shivakant Mishra Secure code distribution in dynamically programmable wireless sensor networks. Search on Bibsonomy IPSN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF secure reprogramming, security, sensor networks
27Prabal K. Dutta, Jonathan W. Hui, David C. Chu, David E. Culler Securing the deluge Network programming system. Search on Bibsonomy IPSN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF authenticated broadcast, dissemination protocols, security, wireless sensor networks, network programming
27César Estébanez, Julio César Hernández Castro, Arturo Ribagorda, Pedro Isasi Viñuela Finding State-of-the-Art Non-cryptographic Hashes with Genetic Programming. Search on Bibsonomy PPSN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27A. Robert Calderbank, Anna C. Gilbert, Kirill Levchenko, S. Muthukrishnan 0001, Martin Strauss 0001 Improved range-summable random variable construction algorithms. Search on Bibsonomy SODA The full citation details ... 2005 DBLP  BibTeX  RDF
27Madanlal Musuvathi, David L. Dill An Incremental Heap Canonicalization Algorithm. Search on Bibsonomy SPIN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Bo Yang 0010, Ramesh Karri, David A. McGrew Divide and concatenate: a scalable hardware architecture for universal MAC. Search on Bibsonomy FPGA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
27Ahto Buldas, Märt Saarepera On Provably Secure Time-Stamping Schemes. Search on Bibsonomy ASIACRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
27Scott Contini, Yiqun Lisa Yin Fast Software-Based Attacks on SecurID. Search on Bibsonomy FSE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
27Shoichi Hirose Yet Another Definition of Weak Collision Resistance and Its Analysis. Search on Bibsonomy ICISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
27Mihir Bellare, Daniele Micciancio A New Paradigm for Collision-Free Hashing: Incrementality at Reduced Cost. Search on Bibsonomy EUROCRYPT The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
27Mihir Bellare, Phillip Rogaway Collision-Resistant Hashing: Towards Making UOWHFs Practical. Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
27Lars R. Knudsen, Bart Preneel Fast and Secure Hashing Based on Codes. Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
27George Havas, Bohdan S. Majewski, Nicholas C. Wormald, Zbigniew J. Czech Graphs, Hypergraphs and Hashing. Search on Bibsonomy WG The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
26Sebastiaan Indesteege, Florian Mendel, Bart Preneel, Martin Schläffer Practical Collisions for SHAMATA-256. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF SHAMATA, hash function, collision attack, SHA-3 candidate
26Eric Brier, Thomas Peyrin Cryptanalysis of CubeHash. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF CubeHash, hash functions, collision
26Yu Sasaki, Kazumaro Aoki Finding Preimages in Full MD5 Faster Than Exhaustive Search. Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF splice-and-cut, hash function, MD5, preimage, one-way, local collision
26Lei Wang 0031, Yu Sasaki, Kazuo Sakiyama, Kazuo Ohta Bit-Free Collision: Application to APOP Attack. Search on Bibsonomy IWSEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF bit-free collision, APOP, hash function, MD5, MD4
26Adam Kirsch, Michael Mitzenmacher Simple summaries for hashing with choices. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF table lookup, hash tables, router architecture
26Martin Dietzfelbinger, Martin Hühne, Christoph Weidling A dictionary implementation based on dynamic perfect hashing. Search on Bibsonomy ACM J. Exp. Algorithmics The full citation details ... 2008 DBLP  DOI  BibTeX  RDF dynamic hashing, Data structures, implementation, hash functions, dictionaries
26Yin Hu, Ghaith Hammouri, Berk Sunar A fast real-time memory authentication protocol. Search on Bibsonomy STC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF fast authentication, memory integrity, universal hash
26Matthieu Finiasz Syndrome Based Collision Resistant Hashing. Search on Bibsonomy PQCrypto The full citation details ... 2008 DBLP  DOI  BibTeX  RDF hash functions, provable security, syndrome decoding
26Kazuki Yoneyama, Satoshi Miyagawa, Kazuo Ohta Leaky Random Oracle (Extended Abstract). Search on Bibsonomy ProvSec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF hash list, provable security, leakage, standard model, random oracle model
26Christophe De Cannière, Christian Rechberger Preimages for Reduced SHA-0 and SHA-1. Search on Bibsonomy CRYPTO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF directed random graph, cryptanalysis, hash function, SHA-1, preimages, SHA-0
26Wei Gao 0007, Xueli Wang, Dongqing Xie Chameleon Hashes Without Key Exposure Based on Factoring. Search on Bibsonomy J. Comput. Sci. Technol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF chameleon signature, key-exposure, chameleon hash
26Fabiano C. Botelho, Nivio Ziviani External perfect hashing for very large key sets. Search on Bibsonomy CIKM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF key sets, large, functions, hash, minimal, perfect
26Kan Yasuda "Sandwich" Is Indeed Secure: How to Authenticate a Message with Just One Hashing. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Merkle-Damgård, Envelope MAC, RFC1828, MAC, Hash Function, Message Authentication Code, HMAC, Compression Function
26Markku-Juhani Olavi Saarinen A Meet-in-the-Middle Collision Attack Against the New FORK-256. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF FORK-256, Hash Function Cryptanalysis, Meet-in-the-middle Attack
26Pedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda An Efficient Authentication Protocol for RFID Systems Resistant to Active Attacks. Search on Bibsonomy EUC Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF IUC, Light-weight Hash functions, Security, Authentication, RFID, Active-attacks
26Fengjun Shang Research on the Traffic Matrix Based on Sampling Model. Search on Bibsonomy ADMA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF non-collision hash, sampling, traffic matrix
26Shoulun Long, Josef Pieprzyk, Huaxiong Wang, Duncan S. Wong Generalised Cumulative Arrays in Secret Sharing. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Cumulative array, Perfect hash family, Secret sharing
26Kaoru Kurosawa, Katja Schmidt-Samoa New Online/Offline Signature Schemes Without Random Oracles. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Online/offline signatures, trapdoor hash, division intractability, strong RSA assumption
26Arjen K. Lenstra, Dan Page, Martijn Stam Discrete Logarithm Variants of VSH. Search on Bibsonomy VIETCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Cyclotomic Subgroup, Hash Functions, Collision Resistance
26Ricardo Chaves, Georgi Kuzmanov, Leonel Sousa, Stamatis Vassiliadis Improving SHA-2 Hardware Implementations. Search on Bibsonomy CHES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF SHA-2 (256, 512), FPGA, Cryptography, Hash functions
26Taejoon Park, Kang G. Shin Soft Tamper-Proofing via Program Integrity Verification in Wireless Sensor Networks. Search on Bibsonomy IEEE Trans. Mob. Comput. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF program-integrity verification, a randomized hash function, sensor networks, Tamper-proofing
26Martin Boesgaard, Thomas Christensen, Erik Zenner Badger - A Fast and Provably Secure MAC. Search on Bibsonomy ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF tree, MAC, universal hash, pseudo-random generator
26Jianhua Ma 0002, Akito Nakamura, Runhe Huang A Random ID Update Scheme to Protect Location Privacy in RFID-Based Student Administration Systems. Search on Bibsonomy DEXA Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF secret ID, hash circuit, traceability, location privacy, RFID tag, reader
26Norbert Pramstaller, Christian Rechberger, Vincent Rijmen Exploiting Coding Theory for Collision Attacks on SHA-1. Search on Bibsonomy IMACC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF low-weight vector, cryptanalysis, hash function, collision, Linear code, SHA-1
26Xiaoyun Wang 0001, Hongbo Yu, Yiqun Lisa Yin Efficient Collision Search Attacks on SHA-0. Search on Bibsonomy CRYPTO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Collision search attacks, Hash functions, SHA-1, SHA-0
Displaying result #301 - #400 of 7013 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license