The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Hash with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1968-1973 (17) 1974-1977 (20) 1978-1980 (18) 1981-1982 (16) 1983-1984 (19) 1985 (16) 1986-1987 (16) 1988-1989 (33) 1990 (33) 1991 (27) 1992 (38) 1993 (28) 1994 (44) 1995 (33) 1996 (36) 1997 (47) 1998 (42) 1999 (62) 2000 (56) 2001 (85) 2002 (139) 2003 (183) 2004 (329) 2005 (415) 2006 (468) 2007 (493) 2008 (494) 2009 (456) 2010 (240) 2011 (205) 2012 (223) 2013 (226) 2014 (182) 2015 (188) 2016 (241) 2017 (229) 2018 (227) 2019 (260) 2020 (232) 2021 (255) 2022 (304) 2023 (278) 2024 (60)
Publication types (Num. hits)
article(2517) book(3) incollection(69) inproceedings(4361) phdthesis(63)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 3717 occurrences of 1502 keywords

Results
Found 7025 publication records. Showing 7013 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
25James R. Bell 0001, Charles H. Kaman The linear quotient hash code. Search on Bibsonomy Commun. ACM The full citation details ... 1970 DBLP  DOI  BibTeX  RDF calculated address, search, hashing, table, keys, hash code, lookup, scatter storage, symbol table
25Shumeet Baluja, Michele Covell Learning to hash: forgiving hash functions and applications. Search on Bibsonomy Data Min. Knowl. Discov. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Audio matching, Machine learning, Hashing, Locality sensitive hashing
25Rasmus Pagh Hash and Displace: Efficient Evaluation of Minimal Perfect Hash Functions. Search on Bibsonomy WADS The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
22Junfeng He, Wei Liu 0005, Shih-Fu Chang Scalable similarity search with optimized kernel hashing. Search on Bibsonomy KDD The full citation details ... 2010 DBLP  DOI  BibTeX  RDF scalable, search, indexing, kernel method, nearest neighbor, hashing, structure data
22Jung Yeon Hwang, Ji Young Chun, Dong Hoon Lee 0001 A note on leakage-resilient authenticated key exchange. Search on Bibsonomy IEEE Trans. Wirel. Commun. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
22V. Kumar Murty, Nikolajs Volkovs ERINDALE: A Polynomial Based Hashing Algorithm. Search on Bibsonomy IWCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
22Djamal Belazzougui, Paolo Boldi, Rasmus Pagh, Sebastiano Vigna Monotone minimal perfect hashing: searching a sorted table with O(1) accesses. Search on Bibsonomy SODA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
22Ely Porat An Optimal Bloom Filter Replacement Based on Matrix Solving. Search on Bibsonomy CSR The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
22Sven Schäge Twin Signature Schemes, Revisited. Search on Bibsonomy ProvSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
22Florian Mendel Two Passes of Tiger Are Not One-Way. Search on Bibsonomy AFRICACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
22Kazumaro Aoki, Yu Sasaki Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF SHA-1, preimage, one-way, meet-in-the-middle, SHA-0
22Pierre-Alain Fouque, David Pointcheval, Sébastien Zimmer HMAC is a randomness extractor and applications to TLS. Search on Bibsonomy AsiaCCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF key extraction, TLS, HMAC, randomness extraction
22Hans Vandierendonck, Koen De Bosschere Constructing Optimal XOR-Functions to Minimize Cache Conflict Misses. Search on Bibsonomy ARCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Michael Backes 0001, Dominique Unruh Limits of Constructive Security Proofs. Search on Bibsonomy ASIACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Udi Ben-Porat, Anat Bremler-Barr, Hanoch Levy Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks. Search on Bibsonomy INFOCOM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Cheng Zhong, Zeng Fan, Defu Su Parallel Approximate Multi-Pattern Matching on Heterogeneous Cluster Systems. Search on Bibsonomy PDCAT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Christian Rechberger, Vincent Rijmen On Authentication with HMAC and Non-random Properties. Search on Bibsonomy Financial Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Stefano Chessa, Roberto Di Pietro, Erina Ferro, Gaetano Giunta, Gabriele Oligeri Mobile Application Security for Video Streaming Authentication and Data Integrity Combining Digital Signature and Watermarking Techniques. Search on Bibsonomy VTC Spring The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Yasuhiro Kiuchi, Tomonobu Ozaki, Takenao Ohkawa Partial Geometric Hashing for Retrieving Similar Interaction Protein Using Profile. Search on Bibsonomy ITNG The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, Angelo Spognardi RIPP-FS: An RFID Identification, Privacy Preserving Protocol with Forward Secrecy. Search on Bibsonomy PerCom Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Florian Mendel, Vincent Rijmen Colliding Message Pair for 53-Step HAS-160. Search on Bibsonomy ICISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Anna Pagh, Rasmus Pagh, Milan Ruzic Linear probing with constant independence. Search on Bibsonomy STOC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF hashing, linear probing
22Ashwin Swaminathan, Yinian Mao, Min Wu 0001 Robust and secure image hashing. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Marcin Zukowski, Sándor Héman, Peter A. Boncz Architecture-conscious hashing. Search on Bibsonomy DaMoN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Debrup Chakraborty, Palash Sarkar 0001 A New Mode of Encryption Providing a Tweakable Strong Pseudo-random Permutation. Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF tweakable encryption, strong pseudo-random permutation, mode of operation
22Yanbing Peng, Jian Gong, Wang Yang, Weijiang Liu Disclosing the Element Distribution of Bloom Filter. Search on Bibsonomy International Conference on Computational Science (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Fangyong Hou, Hongjun He, Zhiying Wang 0003, Kui Dai An Efficient Way to Build Secure Disk. Search on Bibsonomy ISPEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Rina Panigrahy Efficient hashing with lookups in two memory accesses. Search on Bibsonomy SODA The full citation details ... 2005 DBLP  BibTeX  RDF
22Tao Peng 0002, Christopher Leckie, Kotagiri Ramamohanarao Exploiting Traffic Localities for Efficient Flow State Lookup. Search on Bibsonomy NETWORKING The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
22Akashi Satoh Hardware Architecture and Cost Estimates for Breaking SHA-1. Search on Bibsonomy ISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
22Sumit Ganguly, Minos N. Garofalakis, Rajeev Rastogi Tracking set-expression cardinalities over continuous update streams. Search on Bibsonomy VLDB J. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Set expressions, Data streams, Randomized algorithms, Approximate query processing, Data synopses
22Matthias Kuntz, Kai Lampka Probabilistic Methods in State Space Analysis. Search on Bibsonomy Validation of Stochastic Systems The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
22Michael Lifshits, Ilya Blayvas, Roman Goldenberg, Ehud Rivlin, Michael Rudzsky Rehashing for Bayesian Geometric Hashing. Search on Bibsonomy ICPR (3) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
22Fangguo Zhang, Reihaneh Safavi-Naini, Willy Susilo An Efficient Signature Scheme from Bilinear Pairings and Its Applications. Search on Bibsonomy Public Key Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
22Peter C. Dillinger, Panagiotis Manolios Bloom Filters in Probabilistic Verification. Search on Bibsonomy FMCAD The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
22Dahlia Malkhi Dynamic Lookup Networks. Search on Bibsonomy Future Directions in Distributed Computing The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
22Aldar C.-F. Chan A graph-theoretical analysis of multicast authentication. Search on Bibsonomy ICDCS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
22Anindya Datta, Debra E. VanderMeer, Krithi Ramamritham Parallel Star Join + DataIndexes: Efficient Query Processing in Data Warehouses and OLAP. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Parallel star join, dataindexes, query processing, OLAP
22Pi-Chung Wang, Wei-Chun Tseng, Chia-Tai Chan, Yaw-Chung Chen Gigabit Packet Classification by Using Lookahead Caching. Search on Bibsonomy COMPSAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
22Horst H. von Brand On the Distribution of Keys by Hashing. Search on Bibsonomy SCCC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
22S. H. Supangkat, T. Eric, A. S. Pamuji A public key signature for authentication in telephone. Search on Bibsonomy APCCAS (2) The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
22Jia Wang 0002, Wendy Chang, Raj Acharya Efficient and Effective Similar Shape Retrieval. Search on Bibsonomy ICMCS, Vol. 1 The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Similar Shape Retrieval, Majority Voting Algorithm, Content-based Retrieval, Geometric Hashing
22Marcel Waldvogel, George Varghese, Jonathan S. Turner, Bernhard Plattner Scalable High Speed IP Routing Lookups. Search on Bibsonomy SIGCOMM The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
22Chris Charnes, Josef Pieprzyk Attacking the SL2 Hashing Scheme. Search on Bibsonomy ASIACRYPT The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
22Yuliang Zheng 0001, Tsutomu Matsumoto, Hideki Imai Duality between Two Cryptographic Primitives. Search on Bibsonomy AAECC The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
22Donovan A. Schneider, David J. DeWitt A Performance Evaluation of Four Parallel Join Algorithms in a Shared-Nothing Multiprocessor Environment. Search on Bibsonomy SIGMOD Conference The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
22Hans-Peter Kriegel, Michael Schiwietz Performance Comparison of Point and Spatial Access Methods. Search on Bibsonomy SSD The full citation details ... 1989 DBLP  DOI  BibTeX  RDF spatial database systems, access methods, performance comparison
22James P. Richardson, Hongjun Lu, Krishna P. Mikkilineni Design and Evaluation of Parallel Pipelined Join Algorithms. Search on Bibsonomy SIGMOD Conference The full citation details ... 1987 DBLP  DOI  BibTeX  RDF
22Matti O. Jokinen The Effect of Parameter Passing and Other Implementation Dependent Mechanisms is Undecedable. Search on Bibsonomy ACM SIGPLAN Notices The full citation details ... 1982 DBLP  DOI  BibTeX  RDF
22Gebhard Greiter Remarks on Language Concepts for specifying Process Synchronization. Search on Bibsonomy ACM SIGPLAN Notices The full citation details ... 1982 DBLP  DOI  BibTeX  RDF
21Sami Evangelista, Michael Westergaard, Lars Michael Kristensen The ComBack Method Revisited: Caching Strategies and Extension with Delayed Duplicate Detection. Search on Bibsonomy Trans. Petri Nets Other Model. Concurr. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF explicit state model checking, hash compaction, delayed duplicate detection, state space reduction, state explosion problem
21Florian Mendel, Christian Rechberger, Martin Schläffer MD5 Is Weaker Than Weak: Attacks on Concatenated Combiners. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cryptanalysis, hash functions, combiner, differential, MD5
21Tetsu Iwata, Kan Yasuda HBS: A Single-Key Mode of Operation for Deterministic Authenticated Encryption. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF SIV, Universal hash function, security proof, counter mode
21Sebastiaan Indesteege, Bart Preneel Practical Collisions for EnRUPT. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF EnRUPT, hash function, collision attack, SHA-3 candidate
21Eike Kiltz, Krzysztof Pietrzak, Martijn Stam, Moti Yung A New Randomness Extraction Paradigm for Hybrid Encryption. Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF hash proof systems, Chosen-ciphertext security, ElGamal, hybrid encryption, randomness extraction
21Dmitrij Lagutin, Sasu Tarkoma Public Key Signatures and Lightweight Security Solutions in a Wireless Environment. Search on Bibsonomy NEW2AN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF wireless networks, Network security, public key cryptography, hash chains
21Gábor Horváth 0001, Kristóf Gáti Kernel CMAC with Reduced Memory Complexity. Search on Bibsonomy ICANN (1) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF smoothing regularization, memory complexity reduction, CMAC, kernel machines, hash-coding
21João Pedro Barreto 0002, Paulo Ferreira 0001 Efficient Locally Trackable Deduplication in Replicated Systems. Search on Bibsonomy Middleware The full citation details ... 2009 DBLP  DOI  BibTeX  RDF compare-by-hash, data replication, distributed file systems, delta encoding, Data deduplication
21Xuewang Zhang, Linlin Wang Key Technologies for Security Enhancing of Payment Gateway. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF payment gateway, security enhancing, fusion-based solution for SSL and SET protocols, secure hash algorithm, AES
21Peng Wang 0009, Dengguo Feng, Changlu Lin, Wenling Wu Security of Truncated MACs. Search on Bibsonomy Inscrypt The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Robust unforgeability, Message authentication code, Universal hash function, Unforgeability, Unpredictability
21Jiali Choy, Khoongming Khoo New Applications of Differential Bounds of the SDS Structure. Search on Bibsonomy ISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF SPN, branch number, {0, 1}-matrices, differential, universal hash functions
21Stéphane Manuel, Thomas Peyrin Collisions on SHA-0 in One Hour. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF hash functions, SHA-0, boomerang attack
21Gaëtan Leurent MD4 is Not One-Way. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF cryptanalysis, hash function, preimage, MD4, one-way
21David Bauer, Douglas M. Blough, David Cash Minimal information disclosure with efficiently verifiable credentials. Search on Bibsonomy Digital Identity Management The full citation details ... 2008 DBLP  DOI  BibTeX  RDF hash-tree, identity assertion, privacy, PKI, identity management, credential, merkle tree
21Junping Xiang, Maolin Hu An Efficient Method for Sampling and Computing Molecular Surface. Search on Bibsonomy BMEI (1) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF solvent-accessible surface, solvent-excluded surface, parallel computation, hash function, quantitative analysis
21Ying Liu, Jingbo Xia, Jing Dai A Novel Adaptive Proxy Certificates Management Scheme in Military Grid Environment. Search on Bibsonomy NPC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Military Grid, hierarchical one-way chains, proxy certificate, GSI, hash value
21Vishwas Patil, Alessandro Mei, Luigi V. Mancini Addressing interoperability issues in access control models. Search on Bibsonomy AsiaCCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF access control, interoperability, chameleon hash, name spaces
21Marko Hölbl, Christian Rechberger, Tatjana Welzer Searching for Messages Conforming to Arbitrary Sets of Conditions in SHA-256. Search on Bibsonomy WEWoRC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF differential collision search, hash function, conditions, SHA-256
21Goce Jakimoski, K. P. Subbalakshmi On Efficient Message Authentication Via Block Cipher Design Techniques. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Wegman-Carter construction, maximum differential probability, block ciphers, Message authentication, universal hash functions
21John P. Steinberger The Collision Intractability of MDC-2 in the Ideal-Cipher Model. Search on Bibsonomy EUROCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Collision-resistant hashing, MDC-2, cryptographic hash functions, ideal-cipher model
21Kazuhiro Suzuki, Kaoru Kurosawa How to Find Many Collisions of 3-Pass HAVAL. Search on Bibsonomy IWSEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF hash function, collision, differential attack, HAVAL
21Markku-Juhani Olavi Saarinen Linearization Attacks Against Syndrome Based Hashes. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF FSB, Syndrome Based Hashes, Provably Secure Hashes, Hash Function Cryptanalysis, Linearization Attack
21Kan Yasuda Multilane HMAC - Security beyond the Birthday Limit. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF multilane, failure-friendly, hash function, message authentication code, HMAC, NMAC, birthday attack
21Ren-Chiun Wang, Wen-Shenq Juang, Chin-Laung Lei A Simple and Efficient Key Exchange Scheme Against the Smart Card Loss Problem. Search on Bibsonomy EUC Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF authentication, smart card, hash function, password, key exchange
21Ping Yu 0006, Stephen R. Tate An Online/Offline Signature Scheme Based on the Strong RSA Assumption. Search on Bibsonomy AINA Workshops (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Online/Offline Signing, Suitable Hash Function, Digital Signature, Random Oracle, Strong RSA Assumption
21Ran Canetti, Ronald L. Rivest, Madhu Sudan 0001, Luca Trevisan, Salil P. Vadhan, Hoeteck Wee Amplifying Collision Resistance: A Complexity-Theoretic Treatment. Search on Bibsonomy CRYPTO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF hash functions, combiners, collision resistance, hardness amplification
21Kai Chen 0007, Xinglei Zhu, Zhishou Zhang A Hybrid Content-Based Image Authentication Scheme. Search on Bibsonomy PCM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Content hash, Watermarking, Digital Signature, ECC, Image Authentication
21Vassilis Stoumpos, Alex Delis GRACE-based joins on active storage devices. Search on Bibsonomy Distributed Parallel Databases The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Active storage devices, Join processing on disk architectures, Adaptive hash-join, Intelligent disks, Evaluation of algorithms
21YoungGyo Lee, Jeonghee Ahn, Seungjoo Kim, Dongho Won A PKI System for Detecting the Exposure of a User's Secret Key. Search on Bibsonomy EuroPKI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF key-insulated signature, one-time hash chain, NOVOMODO
21Michael Furman, Yossi Matias, Ely Porat LTS: The List-Traversal Synopses System. Search on Bibsonomy NGITS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF program rollback, list traversal, pebbling, hash chain, synopsis
21Matthew Caesar 0001, Miguel Castro 0001, Edmund B. Nightingale, Greg O'Shea, Antony I. T. Rowstron Virtual ring routing: network routing inspired by DHTs. Search on Bibsonomy SIGCOMM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF wireless, distributed hash table, network routing
21Kyriacos E. Pavlou, Richard T. Snodgrass Forensic analysis of database tampering. Search on Bibsonomy SIGMOD Conference The full citation details ... 2006 DBLP  DOI  BibTeX  RDF append-only, corruption diagram, forensic strength, cryptographic hash function
21Michel Abdalla, David Pointcheval A Scalable Password-Based Group Key Exchange Protocol in the Standard Model. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Smooth Projective Hash Functions, Group Key Exchange, Password-based Authentication
21Chris Crutchfield, David Molnar, David Turner, David A. Wagner 0001 Generic On-Line/Off-Line Threshold Signatures. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF On-line/Off-line, Chameleon Hash Functions, Threshold Cryptography, Signature Schemes, Bursty Traffic
21Hongbo Yu, Xiaoyun Wang 0001, Aaram Yun, Sangwoo Park Cryptanalysis of the Full HAVAL with 4 and 5 Passes. Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF message modification, Hash function, collision, differential path
21Kazuhiro Suzuki, Dongvu Tonien, Kaoru Kurosawa, Koji Toyota Birthday Paradox for Multi-collisions. Search on Bibsonomy ICISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF multi-collision, hash function, collision resistant, birthday paradox
21Hong-Su Cho, Sangwoo Park, Soo Hak Sung, Aaram Yun Collision Search Attack for 53-Step HAS-160. Search on Bibsonomy ICISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF collision search attack, HAS-160, cryptanalysis, hash function
21HongKi Lee, DaeHun Nyang, JooSeok Song Message and Its Origin Authentication Protocol for Data Aggregation in Sensor Networks. Search on Bibsonomy EUC Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF sensor networks, authentication, aggregation, hash chain, Merkle tree
21Guilin Wang, Feng Bao 0001 Cryptanalysis of Timestamp-Based Password Authentication Schemes Using Smart Cards. Search on Bibsonomy ICICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF smart card, hash function, attack, password authentication
21Jun-Cheol Jeon, Kee-Young Yoo Authentication Based on Singular Cellular Automata. Search on Bibsonomy ACRI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Singular Operation, Authentication, Cellular Automata, Hash function, One-Time Password
21Vishwas Patil, R. K. Shyamasundar e-coupons: An Efficient, Secure and Delegable Micro-Payment System. Search on Bibsonomy Inf. Syst. Frontiers The full citation details ... 2005 DBLP  DOI  BibTeX  RDF PayWord, security, delegation, one-way hash function, micro-payment, TESLA, SPKI/SDSI
21Anne-Marie Bosneag, Monica Brockmeyer A Unified Formal Specification for a Multi-Consistency Replication System for DHTs. Search on Bibsonomy ECBS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF replica consistency, multi-consistency replication, reliability, formal specification, distributed hash table
21Mikhail J. Atallah, Keith B. Frikken, Michael T. Goodrich, Roberto Tamassia Secure Biometric Authentication for Weak Computational Devices. Search on Bibsonomy Financial Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF authentication, biometrics, smart cards, cryptographic hash functions
21Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky Sufficient Conditions for Collision-Resistant Hashing. Search on Bibsonomy TCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF private information-retrieval, homomorphic encryption, Collision-resistant hash functions
21Wen-Shenq Juang A Simple and Efficient Conference Scheme for Mobile Communications. Search on Bibsonomy WISA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Symmetric cryptosystems, Network security, Mobile communications, One-way hash functions, Conference keys
21Daisuke Takemoto, Shigeaki Tagashira, Satoshi Fujita A Fault-Tolerant Content Addressable Network. Search on Bibsonomy ISPA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF content addressable network, fault-tolerance, distributed hash table, Peer-to-peer system
21Takeshi Okamoto, Atsuo Inomata, Eiji Okamoto A Proposal of Short Proxy Signature using Pairing. Search on Bibsonomy ITCC (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF general hash function, bilinear pairing, elliptic curve cryptosystem, proxy signature, short signature
21Hongbo Yu, Gaoli Wang, Guoyan Zhang, Xiaoyun Wang 0001 The Second-Preimage Attack on MD4. Search on Bibsonomy CANS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF collision differential path, weak message, Hash function, second-preimage
21Di Ma, Robert H. Deng, HweeHwa Pang, Jianying Zhou 0001 Authenticating Query Results in Data Publishing. Search on Bibsonomy ICICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF authentication, data publishing, aggregated signature, merkle hash tree
21Markku-Juhani Olavi Saarinen Cryptanalysis of Block Ciphers Based on SHA-1 and MD5. Search on Bibsonomy FSE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF SHACAL, Dedicated hash functions, MDC, MD5, SHA-1, Slide attacks
Displaying result #501 - #600 of 7013 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license