The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Hash with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1968-1973 (17) 1974-1977 (20) 1978-1980 (18) 1981-1982 (16) 1983-1984 (19) 1985 (16) 1986-1987 (16) 1988-1989 (33) 1990 (33) 1991 (27) 1992 (38) 1993 (28) 1994 (44) 1995 (33) 1996 (36) 1997 (47) 1998 (42) 1999 (62) 2000 (56) 2001 (85) 2002 (139) 2003 (183) 2004 (329) 2005 (415) 2006 (468) 2007 (493) 2008 (494) 2009 (456) 2010 (240) 2011 (205) 2012 (223) 2013 (226) 2014 (182) 2015 (188) 2016 (241) 2017 (229) 2018 (227) 2019 (260) 2020 (232) 2021 (255) 2022 (304) 2023 (278) 2024 (60)
Publication types (Num. hits)
article(2517) book(3) incollection(69) inproceedings(4361) phdthesis(63)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 3717 occurrences of 1502 keywords

Results
Found 7025 publication records. Showing 7013 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
26Xiaoyun Wang 0001, Yiqun Lisa Yin, Hongbo Yu Finding Collisions in the Full SHA-1. Search on Bibsonomy CRYPTO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF collision search attacks, Hash functions, SHA-1, SHA-0
26Erik Anderson, Cheryl L. Beaver, Timothy Draelos, Richard Schroeppel, Mark Torgerson ManTiCore: Encryption with Joint Cipher-State Authentication. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Encryption Mode, Inexpensive Authentication, Luby-Rackoff, Feistel, Middletext, Hash, Cipher
26Patrick Reynolds, Amin Vahdat Efficient Peer-to-Peer Keyword Searching. Search on Bibsonomy Middleware The full citation details ... 2003 DBLP  DOI  BibTeX  RDF peer-to-peer, caching, search, distributed hash table, Bloom filter
26Ziv Bar-Yossef, Luca Trevisan, Omer Reingold, Ronen Shaltiel Streaming Computation of Combinatorial Objects. Search on Bibsonomy CCC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF error-correcting codes, extractors, dispersers, streaming computation, universal hash functions, online computation
26Adi Shamir, Yael Tauman Improved Online/Offline Signature Schemes. Search on Bibsonomy CRYPTO The full citation details ... 2001 DBLP  DOI  BibTeX  RDF on-line/off-line, trapdoor hash functions, signature schemes
26Jian-Ru Chen, Shih-Wei Sun, Chun-Shien Lu, Pao-Chi Chang Video JET: packet loss-resilient video joint encryption and transmission based on media-hash-embedded residual data. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF (Selective) Encryption, Media hashing, Motion estimation/compensation, Embedding, Packet loss, Error resilience, Error concealment
26Susan Hohenberger, Brent Waters Realizing Hash-and-Sign Signatures under Standard Assumptions. Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
26Douglas R. Stinson, Gregory M. Zaverucha Some Improved Bounds for Secure Frameproof Codes and Related Separating Hash Families. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26William E. Burr A New Hash Competition. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26Christian Henke, Carsten Schmoll, Tanja Zseby Evaluation of Header Field Entropy for Hash-Based Packet Selection. Search on Bibsonomy PAM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26Marc Fischlin, Anja Lehmann, Krzysztof Pietrzak Robust Multi-property Combiners for Hash Functions Revisited. Search on Bibsonomy ICALP (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26Shay Gueron, Michael E. Kounavis Vortex: A New Family of One-Way Hash Functions Based on AES Rounds and Carry-Less Multiplication. Search on Bibsonomy ISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26Tong-Lee Lim, Tieyan Li, Tao Gu Secure RFID Identification and Authentication with Triggered Hash Chain Variants. Search on Bibsonomy ICPADS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26Helena Handschuh, Bart Preneel Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms. Search on Bibsonomy CRYPTO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26Almitra Pradhan, Ranga Vemuri On the Use of Hash Tables for Efficient Analog Circuit Synthesis. Search on Bibsonomy VLSI Design The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26Socrates Demetriades, Michel Hanna, Sangyeun Cho, Rami G. Melhem An Efficient Hardware-Based Multi-hash Scheme for High Speed IP Lookup. Search on Bibsonomy Hot Interconnects The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26Miguel Jimeno, Kenneth J. Christensen P2P directory search: Signature Array Hash Table. Search on Bibsonomy LCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26Bo Yang 0010, Ramesh Karri Power Optimization for Universal Hash Function Data Path Using Divide-and-Concatenate Technique. Search on Bibsonomy IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Hiroki Koga Source Coding Using Families of Universal Hash Functions. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26João Ascenso, Fernando Pereira 0001 Adaptive Hash-Based Side Information Exploitation for Efficient Wyner-Ziv Video Coding. Search on Bibsonomy ICIP (3) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Amjad M. Daoud Perfect hash functions for large dictionaries. Search on Bibsonomy CIMS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF indexing, random graphs, MOS, perfect hashing, acyclic
26Kenneth A. Ross Efficient Hash Probes on Modern Processors. Search on Bibsonomy ICDE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Felix Putze, Peter Sanders 0001, Johannes Singler Cache-, Hash- and Space-Efficient Bloom Filters. Search on Bibsonomy WEA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Thomas Ristenpart, Thomas Shrimpton How to Build a Hash Function from Any Collision-Resistant Function. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Fabian Stäber, Gerald Kunzmann, Jörg P. Müller Extended Prefix Hash Trees for a distributed phone book application. Search on Bibsonomy ICPADS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Sylvain Pasini, Serge Vaudenay Hash-and-Sign with Weak Hashing Made Secure. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Krzysztof Pietrzak Non-trivial Black-Box Combiners for Collision-Resistant Hash-Functions Don't Exist. Search on Bibsonomy EUROCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Martin Dietzfelbinger Design Strategies for Minimal Perfect Hash Functions. Search on Bibsonomy SAGA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Li Chen, Haojun Zhang, Nan Liu Authentication and Micropayment Protocols based on Self-Updating Hash Chains. Search on Bibsonomy GCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Florian Mendel, Joseph Lano, Bart Preneel Cryptanalysis of Reduced Variants of the FORK-256 Hash Function. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Scott Contini, Krystian Matusiewicz, Josef Pieprzyk Extending FORK-256 Attack to the Full Hash Function. Search on Bibsonomy ICICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Zhiyong Xu, Laxmi N. Bhuyan, Yiming Hu Tulip: A New Hash Based Cooperative Web Caching Architecture. Search on Bibsonomy J. Supercomput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Douglas R. Stinson Some Observations on the Theory of Cryptographic Hash Functions. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF AMS Classification 94A60
26Yannick Chevalier, Mounira Kourjieh A Symbolic Intruder Model for Hash-Collision Attacks. Search on Bibsonomy ASIAN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Fong Pong Fast and Robust TCP Session Lookup by Digest Hash. Search on Bibsonomy ICPADS (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Frédéric Muller, Thomas Peyrin Cryptanalysis of T-Function-Based Hash Functions. Search on Bibsonomy ICISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Yi Jiang, Guangtao Xue, Jinyuan You Toward Fault-Tolerant Atomic Data Access in Mutable Distributed Hash Tables. Search on Bibsonomy IMSCCS (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Véronique Cortier, Steve Kremer, Ralf Küsters, Bogdan Warinschi Computationally Sound Symbolic Secrecy in the Presence of Hash Functions. Search on Bibsonomy FSTTCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Karsten Nohl, David Evans 0001 Quantifying Information Leakage in Tree-Based Hash Protocols (Short Paper). Search on Bibsonomy ICICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Haralambos Michail, Athanasios Kakarountas, George N. Selimis, Costas E. Goutis Optimizing SHA-1 Hash Function for High Throughput with a Partial Unrolling Study. Search on Bibsonomy PATMOS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Julien Langou, George Bosilca, Graham E. Fagg, Jack J. Dongarra Hash Functions for Datatype Signatures in MPI. Search on Bibsonomy PVM/MPI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Marco Macchetti, Luigi Dadda Quasi-Pipelined Hash Circuits. Search on Bibsonomy IEEE Symposium on Computer Arithmetic The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Arjen K. Lenstra, Benne de Weger On the Possibility of Constructing Meaningful Hash Collisions for Public Keys. Search on Bibsonomy ACISP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Xiaoyun Wang 0001, Hongbo Yu How to Break MD5 and Other Hash Functions. Search on Bibsonomy EUROCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Nikolas Askitis, Justin Zobel Cache-Conscious Collision Resolution in String Hash Tables. Search on Bibsonomy SPIRE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Olaf Landsiedel, Katharina Anna Lehmann, Klaus Wehrle T-DHT: Topology-based Distributed Hash Tables. Search on Bibsonomy Peer-to-Peer Computing The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Shimin Chen, Anastassia Ailamaki, Phillip B. Gibbons, Todd C. Mowry Improving Hash Join Performance through Prefetching. Search on Bibsonomy ICDE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
26Roar Lien, Tim Grembowski, Kris Gaj A 1 Gbit/s Partially Unrolled Architecture of Hash Functions SHA-1 and SHA-512. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
26Antoine Joux Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions. Search on Bibsonomy CRYPTO The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
26Simon Rieche, Leo Petrak, Klaus Wehrle A Thermal-Dissipation-Based Approach for Balancing Data Load in Distributed Hash Tables. Search on Bibsonomy LCN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
26Bo Yang 0010, Ramesh Karri, David A. McGrew Divide-and-concatenate: an architecture level optimization technique for universal hash functions. Search on Bibsonomy DAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Performance, Design, Experimentation
26Dimitris Fotakis 0001, Rasmus Pagh, Peter Sanders 0001, Paul G. Spirakis Space Efficient Hash Tables with Worst Case Constant Access Time. Search on Bibsonomy STACS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
26Nicolas Sklavos 0001, Odysseas G. Koufopavlou On the hardware implementations of the SHA-2 (256, 384, 512) hash functions. Search on Bibsonomy ISCAS (5) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
26Ching-Nung Yang, Hsu-Tun Teng An Efficient Method for Finding Minmum Hash Chain of Multi-Payword Chains in Micropayment. Search on Bibsonomy CEC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
26Donghoon Chang, Jaechul Sung, Soo Hak Sung, Sangjin Lee 0002, Jongin Lim 0001 Full-Round Differential Attack on the Original Version of the Hash Function Proposed at PKC'98. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
26Kenji Imasaki, Sivarama P. Dandamudi An Adaptive Hash Join Algorithm on a Network of Workstations. Search on Bibsonomy IPDPS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
26Xueyan Tang, Samuel T. Chanson Optimal Hash Routing for Web Proxies. Search on Bibsonomy ICDCS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
26David A. Wagner 0001 Cryptanalysis of the Yi-Lam Hash. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
26Bart Preneel, Paul C. van Oorschot MDx-MAC and Building Fast MACs from Hash Functions. Search on Bibsonomy CRYPTO The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
26Ming-Ling Lo, Ming-Syan Chen, Chinya V. Ravishankar, Philip S. Yu On Optimal Processor Allocation to Support Pipelined Hash Joins. Search on Bibsonomy SIGMOD Conference The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
26Jacques Patarin How to Find and Avoid Collisions for the Knapsack Hash Function. Search on Bibsonomy EUROCRYPT The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
26Bart Preneel, René Govaerts, Joos Vandewalle Hash Functions Based on Block Ciphers: A Synthetic Approach. Search on Bibsonomy CRYPTO The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
26Edward A. Fox, Qi Fan Chen, Lenwood S. Heath, Sanjeev Datta A More Cost Effective Algorithm for Finding Perfect Hash Functions. Search on Bibsonomy ACM Conference on Computer Science The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
26Ivan Damgård Collision Free Hash Functions and Public Key Signature Schemes. Search on Bibsonomy EUROCRYPT The full citation details ... 1987 DBLP  DOI  BibTeX  RDF
26Jason Gait Hash table methods for case statements. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 1982 DBLP  DOI  BibTeX  RDF Case Statements, Compiler Implementation, Open Addressing, Computer Architecture, Hashing
26Sascha Zmudzinski, Martin Steinebach Psycho-acoustic model-based message authentication coding for audio data. Search on Bibsonomy MM&Sec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF authentication watermarking, psycho-acoustic modelling, audio fingerprinting, perceptual hash, robust hash
26Kumar Chellapilla, Anton Mityagin, Denis Xavier Charles GigaHash: scalable minimal perfect hashing for billions of urls. Search on Bibsonomy WWW The full citation details ... 2007 DBLP  DOI  BibTeX  RDF minimal perfect hashing, space efficient hash table, web search engine, perfect hash function
26Cheng Peng, Robert H. Deng, Yongdong Wu, Weizhong Shao A flexible and scalable authentication scheme for JPEG2000 image codestreams. Search on Bibsonomy ACM Multimedia The full citation details ... 2003 DBLP  DOI  BibTeX  RDF message digest, authentication, data integrity, digital signature, image compression, JPEG2000, one-way hash function, merkle hash tree
26Hans Dobbertin Cryptanalysis of MD4. Search on Bibsonomy J. Cryptol. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Dedicated hash functions, RIPEMD, Dedicated hash functions, RIPEMD, Collisions, Collisions, Key words, MD5, MD5, MD4, MD4
25Wouter Teepe On BAN logic and hash functions or: how an unjustified inference rule causes problems. Search on Bibsonomy Auton. Agents Multi Agent Syst. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Two parrots protocol, Security protocol, Soundness, Cryptographic hash function, BAN logic
25Somitra Kumar Sanadhya, Palash Sarkar 0001 A new hash family obtained by modifying the SHA-2 family. Search on Bibsonomy AsiaCCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF SHA-2 hash family, reduced round attacks, cryptanalysis
25Jian Guo 0001, Krystian Matusiewicz, Lars R. Knudsen, San Ling, Huaxiong Wang Practical Pseudo-collisions for Hash Functions ARIRANG-224/384. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF pseudo-collision, ARIRANG, hash function, practical
25Keith Needels, Minseok Kwon Secure routing in peer-to-peer distributed hash tables. Search on Bibsonomy SAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF security, routing, distributed hash tables, peer-to-peer overlay networks
25Sebastian Rohde, Thomas Eisenbarth 0001, Erik Dahmen, Johannes Buchmann 0001, Christof Paar Fast Hash-Based Signatures on Constrained Devices. Search on Bibsonomy CARDIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF hash based cryptography, Merkle signature scheme, digital signatures, Embedded security
25Yusuke Doi, Shirou Wakayama, Satoshi Ozaki A Design for Distributed Backup and Migration of Distributed Hash Tables. Search on Bibsonomy SAINT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Design, Distributed Hash Tables, Durability
25Jean-Philippe Aumasson, Willi Meier, Raphael C.-W. Phan The Hash Function Family LAKE. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF HAIFA, Randomized hashing, Salt, Wide-pipe, Hash function
25Takeshi Sugawara 0001, Naofumi Homma, Takafumi Aoki, Akashi Satoh Compact ASIC Architectures for the 512-Bit Hash Function Whirlpool. Search on Bibsonomy WISA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Hash function, Hardware architecture, Whirlpool, Cryptographic hardware
25Yu Sasaki, Lei Wang 0031, Kazuo Ohta, Noboru Kunihiro Password Recovery on Challenge and Response: Impossible Differential Attack on Hash Function. Search on Bibsonomy AFRICACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Challenge and Response, Prefix, Impossible Differential Attack, Hash Function, Hybrid, MD4, Local Collision
25Jie Liang, Xuejia Lai Improved Collision Attack on Hash Function MD5. Search on Bibsonomy J. Comput. Sci. Technol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF hash function, collision, MD5, differential attack
25Willi Geiselmann, Rainer Steinwandt Cryptanalysis of a Hash Function Proposed at ICISC 2006. Search on Bibsonomy ICISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF cryptanalysis, hash function
25Jin-Oh Jeon, Su-Bong Ryu, Sang-Jo Park, Min-Sup Kang Strong Authentication Protocol for RFID Tag Using SHA-1 Hash Algorithm. Search on Bibsonomy ICCSA (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Strong authentication protocol, SHA-1 hash algorithm, Three-way challenge response, ISO/IEC 1800-3 standard, Digital Codec design, RFID Tag
25Mohammad Reza Selim, Takumi Endo, Yuichi Goto, Jingde Cheng Distributed hash table based design of Soft System Buses. Search on Bibsonomy Infoscale The full citation details ... 2007 DBLP  DOI  BibTeX  RDF chord protocol, soft system bus, middleware, distributed hash table
25Eun-Jun Yoon, Kee-Young Yoo A Secure Chaotic Hash-Based Biometric Remote User Authentication Scheme Using Mobile Devices. Search on Bibsonomy APWeb/WAIM Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Chaotic hash, Mobile devices, Cryptanalysis, Biometric authentication
25John Aycock, Rennie deGraaf, Michael J. Jacobson Jr. Anti-disassembly using Cryptographic Hash Functions. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Code armoring, Reverse-engineering, Hash function, Virus, Disassembly
25Charanjit S. Jutla, Anindya C. Patthak Provably Good Codes for Hash Function Design. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF linear codes, SHA-1, minimum distance, collision-resistant hash functions
25Andrew Brampton, Andrew MacQuire, Idris A. Rai, Nicholas J. P. Race, Laurent Mathy Stealth distributed hash table: a robust and flexible super-peered DHT. Search on Bibsonomy CoNEXT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF stealth DHT, peer-to-peer, distributed hash tables
25Nandakishore Ramaswamy, K. R. Rao 0001 Video authentication for H.264/AVC using digital signature standard and secure hash algorithm. Search on Bibsonomy NOSSDAV The full citation details ... 2006 DBLP  DOI  BibTeX  RDF digital signature standard, secure hash, video authentication, H.264/AVC, multimedia security
25Alok Garg, Fernando Castro, Michael C. Huang 0001, Daniel Chaver, Luis Piñuel, Manuel Prieto 0001 Substituting associative load queue with simple hash tables in out-of-order microprocessors. Search on Bibsonomy ISLPED The full citation details ... 2006 DBLP  DOI  BibTeX  RDF LSQ, scalability, hash table, memory disambiguation
25Hui Zhang 0002, Ashish Goel, Ramesh Govindan Improving lookup latency in distributed hash table systems using random sampling. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF latency expansion, latency stretch, peer-to-peer, randomized algorithm, distributed hash table (DHT), random sampling, internet topology
25Wei-Chi Ku, Min-Hung Chiang, Shen-Tien Chang Weaknesses of Yoon-Ryu-Yoo's hash-based password authentication scheme. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF hash function, password authentication, guessing attack, denial-of-service attack, stolen-verifier attack
25George Giakkoupis, Vassos Hadzilacos A scheme for load balancing in heterogenous distributed hash tables. Search on Bibsonomy PODC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF peer-to-peer, load balancing, distributed hash tables
25Jose L. Muñoz, Jordi Forné, Oscar Esparza, Miguel Soriano Certificate revocation system implementation based on the Merkle hash tree. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Public-key infrastructure, Certificate revocation, Merkle hash tree
25Ji Li 0010, Karen R. Sollins, Dah-Yoh Lim Implementing aggregation and broadcast over Distributed Hash Tables. Search on Bibsonomy Comput. Commun. Rev. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF peer-to-peer, broadcast, aggregation, tree, distributed hash table
25Miguel Rodrigues Fornari, Cirano Iochpe A spatial hash join algorithm suited for small buffer size. Search on Bibsonomy GIS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF GIS, hash, spatial join, geographic databases
25Gurmeet Singh Manku Balanced binary trees for ID management and load balance in distributed hash tables. Search on Bibsonomy PODC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF ID management, peer to peer, load balance, P2P, DHT, distributed hash table, binary tree
25Yacine Challal, Abdelmadjid Bouabdallah, Yoann Hinard Efficient Multicast Source Authentication using Layered Hash-Chaining Scheme. Search on Bibsonomy LCN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Layered hash-chaining, Multicast streaming, Non-repudiation
25Ori Shalev, Nir Shavit Split-ordered lists: lock-free extensible hash tables. Search on Bibsonomy PODC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Non-blocking Synchronization, Real-Time, Hash Table, Compare-and-Swap, Concurrent Data Structures
25Cheng-Chi Lee, Li-Hua Li, Min-Shiang Hwang A remote user authentication scheme using hash functions. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF cryptography, hash function, password, guessing attack, digest
25Daniele Micciancio Improved Cryptographic Hash Functions with Worst-Case/Average-Case Connection. Search on Bibsonomy CCC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF worst-case/average-case connection, computational complexity, cryptography, hash functions, lattices
25Eric Filiol A New Statistical Testing for Symmetric Ciphers and Hash Functions. Search on Bibsonomy ICICS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Möbius transform, Boolean function, hash function, randomness, statistical testing, Walsh Transform, symmetric cipher
Displaying result #401 - #500 of 7013 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license