|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 3717 occurrences of 1502 keywords
|
|
|
Results
Found 7025 publication records. Showing 7013 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
21 | Douglas L. Whiting, Michael J. Sabin |
Montgomery Prime Hashing for Message Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2003, The Cryptographers' Track at the RSA Conference 2003, San Francisco, CA, USA, April 13-17, 2003, Proceedings, pp. 50-67, 2003, Springer, 3-540-00847-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
MAC, message authentication, Universal hash |
21 | Micah Adler, Eran Halperin, Richard M. Karp, Vijay V. Vazirani |
A stochastic process on the hypercube with applications to peer-to-peer networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STOC ![In: Proceedings of the 35th Annual ACM Symposium on Theory of Computing, June 9-11, 2003, San Diego, CA, USA, pp. 575-584, 2003, ACM, 1-58113-674-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
coupon collector, peer to peer, load balancing, hypercube, hash table |
21 | Nick G. Duffield, Matthias Grossglauser |
Trajectory sampling for direct traffic observation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE/ACM Trans. Netw. ![In: IEEE/ACM Trans. Netw. 9(3), pp. 280-292, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Internet traffic measurement, Hash functions, traffic engineering, packet sampling |
21 | Moni Naor, Vanessa Teague |
Anti-presistence: history independent data structures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STOC ![In: Proceedings on 33rd Annual ACM Symposium on Theory of Computing, July 6-8, 2001, Heraklion, Crete, Greece, pp. 492-501, 2001, ACM, 1-58113-349-9. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
anti-persistence, history independence, security, privacy, algorithms, data structures, hash table |
21 | Antoon Bosselaers, René Govaerts, Joos Vandewalle |
SHA: A Design for Parallel Architectures? ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '97, International Conference on the Theory and Application of Cryptographic Techniques, Konstanz, Germany, May 11-15, 1997, Proceeding, pp. 348-362, 1997, Springer, 3-540-62975-0. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
multiple-issue architectures, instruction-level parallelism, Cryptographic hash functions, critical path analysis |
21 | Stephen H. Brackin |
A HOL extension of GNY for automatically analyzing cryptographic protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: Ninth IEEE Computer Security Foundations Workshop, March 10 - 12, 1996, Dromquinna Manor, Kenmare, County Kerry, Ireland, pp. 62-, 1996, IEEE Computer Society, 0-8186-7522-5. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
HOL extension, automatically analyzing cryptographic protocols, higher order logic theory, authentication properties, protocol properties, hash operations, key-exchange algorithms, formal specification, cryptography, message authentication, access protocols, message authentication codes, multiple encryption, belief maintenance, belief logic |
21 | Thomas C. Irby |
Minimizing the retrieval time of scatter storage techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Annual Conference (2) ![In: Proceedings 1978 ACM Annual Conference, Washington, DC, USA, December 4-6, 1978, Volume II, pp. 834-839, 1978, ACM, 978-0-89791-000-2. The full citation details ...](Pics/full.jpeg) |
1978 |
DBLP DOI BibTeX RDF |
Minimal retrieval, Hash coding, Scatter storage |
21 | Charanjit S. Jutla, Anindya C. Patthak |
Provably Good Codes for Hash Function Design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Theory ![In: IEEE Trans. Inf. Theory 55(1), pp. 33-45, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Jing-pei Wang, Shuifa Sun, Ming Jiang 0015, Dan-gui Xie, Bang Jun Lei |
Anti-protocol Attacks Digital Watermarking Based on Media-Hash and SVD. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Fifth International Conference on Information Assurance and Security, IAS 2009, Xi'An, China, 18-20 August 2009, pp. 364-367, 2009, IEEE Computer Society, 978-0-7695-3744-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Fangyong Hou, Dawu Gu, Nong Xiao, Fang Liu 0002, Hongjun He |
Performance and Consistency Improvements of Hash Tree Based Disk Storage Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NAS ![In: International Conference on Networking, Architecture, and Storage, NAS 2009, 9-11 July 2009, Zhang Jia Jie, Hunan, China, pp. 51-56, 2009, IEEE Computer Society, 978-0-7695-3741-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Sajid Hussain, Md. Shafayat Rahman, Laurence Tianruo Yang |
Key Predistribution Scheme using Keyed Hash Chain and Multipath Key Reinforcement for Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PerCom Workshops ![In: Seventh Annual IEEE International Conference on Pervasive Computing and Communications - Workshops (PerCom Workshops 2009), 9-13 March 2009, Galveston, TX, USA, pp. 1-6, 2009, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Oguzhan Kara, Adem Atalay |
Preimages of hash functions through rainbow tables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCIS ![In: The 24th International Symposium on Computer and Information Sciences, ISCIS 2009, 14-16 September 2009, North Cyprus, pp. 304-309, 2009, IEEE. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Yu Sasaki, Kazumaro Aoki |
Meet-in-the-Middle Preimage Attacks on Double-Branch Hash Functions: Application to RIPEMD and Others. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 14th Australasian Conference, ACISP 2009, Brisbane, Australia, July 1-3, 2009, Proceedings, pp. 214-231, 2009, Springer, 978-3-642-02619-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
RIPEMD, double branch, preimage, meet-in-the-middle |
21 | Eiichiro Fujisaki, Ryo Nishimaki, Keisuke Tanaka |
On the Insecurity of the Fiat-Shamir Signatures with Iterative Hash Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security, Third International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009. Proceedings, pp. 118-128, 2009, Springer, 978-3-642-04641-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Christophe Petit 0001, Jean-Jacques Quisquater, Jean-Pierre Tillich, Gilles Zémor |
Hard and Easy Components of Collision Search in the Zémor-Tillich Hash Function: New Attacks and Reduced Variants with Equivalent Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2009, The Cryptographers' Track at the RSA Conference 2009, San Francisco, CA, USA, April 20-24, 2009. Proceedings, pp. 182-194, 2009, Springer, 978-3-642-00861-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Mario Lamberger, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen |
Analysis of the Hash Function Design Strategy Called SMASH. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Theory ![In: IEEE Trans. Inf. Theory 54(8), pp. 3647-3655, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Ruonan Rao, Shuying Liang, Jinyuan You |
HTL: A Locality Bounded Flat Hash Location Service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NPC ![In: Network and Parallel Computing, IFIP International Conference, NPC 2008, Shanghai, China, October 18-20, 2008. Proceedings, pp. 138-149, 2008, Springer, 978-3-540-88139-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Jun Peng, Du Zhang, Yongguo Liu, Xiaofeng Liao 0001 |
A Double-Piped iterated hash function based on a hybrid of chaotic maps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE ICCI ![In: Proceedings of the Seventh IEEE International Conference on Cognitive Informatics, ICCI 2008, Stanford University, California, USA, August 14-16, 2008, pp. 358-365, 2008, IEEE Computer Society, 978-1-4244-2538-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Erik Dahmen, Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume |
Digital Signatures Out of Second-Preimage Resistant Hash Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PQCrypto ![In: Post-Quantum Cryptography, Second International Workshop, PQCrypto 2008, Cincinnati, OH, USA, October 17-19, 2008, Proceedings, pp. 109-123, 2008, Springer, 978-3-540-88402-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
second-preimage resistance, provable security, Merkle signatures |
21 | Ke Xu 0002, Xiaowei Ma, Chunyu Liu |
A Hash Tree Based Authentication Scheme in SIP Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: Proceedings of IEEE International Conference on Communications, ICC 2008, Beijing, China, 19-23 May 2008, pp. 1510-1514, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Zhoucan He, Qing Wang 0006 |
A Fast and Effective Dichotomy Based Hash Algorithm for Image Matching. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISVC (1) ![In: Advances in Visual Computing, 4th International Symposium, ISVC 2008, Las Vegas, NV, USA, December 1-3, 2008. Proceedings, Part I, pp. 328-337, 2008, Springer, 978-3-540-89638-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Wenceslao Palma, Reza Akbarinia, Esther Pacitti, Patrick Valduriez |
Efficient Processing of Continuous Join Queries Using Distributed Hash Tables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Euro-Par ![In: Euro-Par 2008 - Parallel Processing, 14th International Euro-Par Conference, Las Palmas de Gran Canaria, Spain, August 26-29, 2008, Proceedings, pp. 632-641, 2008, Springer, 978-3-540-85450-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Heeyeol Yu, Rabi N. Mahapatra |
A space- and time-efficient hash table hierarchically indexed by Bloom filters. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPDPS ![In: 22nd IEEE International Symposium on Parallel and Distributed Processing, IPDPS 2008, Miami, Florida USA, April 14-18, 2008, pp. 1-12, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Eli Biham |
New Techniques for Cryptanalysis of Hash Functions and Improved Attacks on Snefru. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers, pp. 444-461, 2008, Springer, 978-3-540-71038-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Jean-Pierre Tillich, Gilles Zémor |
Collisions for the LPS Expander Graph Hash Function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings, pp. 254-269, 2008, Springer, 978-3-540-78966-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Avinash L. Varna, Ashwin Swaminathan, Min Wu 0001 |
A decision theoretic framework for analyzing binary hash-based content identification systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Rights Management Workshop ![In: Proceedings of the 8th ACM Workshop on Digital Rights Management, Alexandria, VA, USA, October 27, 2008, pp. 67-76, 2008, ACM, 978-1-60558-290-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
content fingerprinting, content identification, decision theory |
21 | Akashi Satoh |
ASIC hardware implementations for 512-bit hash function Whirlpool. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS ![In: International Symposium on Circuits and Systems (ISCAS 2008), 18-21 May 2008, Sheraton Seattle Hotel, Seattle, Washington, USA, pp. 2917-2920, 2008, IEEE, 978-1-4244-1683-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
21 | T. Rajendran, K. V. Sreenaath |
Hash optimization for cryptographically generated address. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMSWARE ![In: Proceedings of the Third International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2008), January 5-10, 2008, Bangalore, India, pp. 365-369, 2008, IEEE, 978-1-4244-1797-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Dennis Hofheinz, Eike Kiltz |
Programmable Hash Functions and Their Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedings, pp. 21-38, 2008, Springer, 978-3-540-85173-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Luc Devroye, Gábor Lugosi, GaHyun Park, Wojciech Szpankowski |
Multiple choice tries and distributed hash tables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SODA ![In: Proceedings of the Eighteenth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2007, New Orleans, Louisiana, USA, January 7-9, 2007, pp. 891-899, 2007, SIAM, 978-0-898716-24-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
21 | Ivan Dedinski, Andreas Berl, Alexander Hofmann, Sebastian Heglmeier, Bernhard Sick, Hermann de Meer |
A Source Routing Solution to Non-Transitive Connectivity Problems in Distributed Hash Tables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the 12th IEEE Symposium on Computers and Communications (ISCC 2007), July 1-4, Aveiro, Portugal, pp. 601-608, 2007, IEEE Computer Society, 978-1-4244-1520-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Sungju Lee, Daesung Moon, Seunghwan Jung, Yongwha Chung |
Protecting Secret Keys with Fuzzy Fingerprint Vault Based on a 3D Geometric Hash Table. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICANNGA (2) ![In: Adaptive and Natural Computing Algorithms, 8th International Conference, ICANNGA 2007, Warsaw, Poland, April 11-14, 2007, Proceedings, Part II, pp. 432-439, 2007, Springer, 978-3-540-71590-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Li Weng, Bart Preneel |
Attacking Some Perceptual Image Hash Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICME ![In: Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, ICME 2007, July 2-5, 2007, Beijing, China, pp. 879-882, 2007, IEEE Computer Society, 1-4244-1017-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Jean-Philippe Aumasson, Willi Meier |
Analysis of Multivariate Hash Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2007, 10th International Conference, Seoul, Korea, November 29-30, 2007, Proceedings, pp. 309-323, 2007, Springer, 978-3-540-76787-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Praveen Gauravaram, Katsuyuki Okeya |
An Update on the Side Channel Cryptanalysis of MACs Based on Cryptographic Hash Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2007, 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings, pp. 393-403, 2007, Springer, 978-3-540-77025-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
M-NMAC, MDx-MAC, Side channel attacks, DPA, HMAC |
21 | Benoît Chevallier-Mames, Marc Joye |
A Practical and Tightly Secure Signature Scheme Without Hash Function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2007, The Cryptographers' Track at the RSA Conference 2007, San Francisco, CA, USA, February 5-9, 2007, Proceedings, pp. 339-356, 2007, Springer, 3-540-69327-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Fabius Klemm, Sarunas Girdzijauskas, Jean-Yves Le Boudec, Karl Aberer |
On Routing in Distributed Hash Tables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Peer-to-Peer Computing ![In: Seventh IEEE International Conference on Peer-to-Peer Computing (P2P 2007), September 2-5, 2007, Galway, Ireland, pp. 113-122, 2007, IEEE Computer Society, 0-7695-2986-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Robert P. McEvoy, Francis M. Crowe, Colin C. Murphy, William P. Marnane |
Optimisation of the SHA-2 Family of Hash Functions on FPGAs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISVLSI ![In: 2006 IEEE Computer Society Annual Symposium on VLSI (ISVLSI 2006), 2-3 March 2006, Karlsruhe, Germany, pp. 317-322, 2006, IEEE Computer Society, 0-7695-2533-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Hong-qiang Li, Chang-yun Miao |
Hardware Implementation of Hash Function SHA-512. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICIC (2) ![In: First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August - 1 September 2006, Beijing, China, pp. 38-42, 2006, IEEE Computer Society, 0-7695-2616-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Davood Rafiei, Cheng Hu |
Bulk Loading a Linear Hash File. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DaWaK ![In: Data Warehousing and Knowledge Discovery, 8th International Conference, DaWaK 2006, Krakow, Poland, September 4-8, 2006, Proceedings., pp. 23-32, 2006, Springer, 3-540-37736-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Scott Contini, Yiqun Lisa Yin |
Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings, pp. 37-53, 2006, Springer, 3-540-49475-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Zhitang Li, Weidong Wang, Yejiang Zhang, Weiming Li |
Source Authentication of Media Streaming Based on Chains of Iso-hash Clusters. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATC ![In: Autonomic and Trusted Computing, Third International Conference, ATC 2006, Wuhan, China, September 3-6, 2006, Proceedings, pp. 398-407, 2006, Springer, 3-540-38619-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Praveen Gauravaram, William Millan, Ed Dawson, Kapali Viswanathan |
Constructing Secure Hash Functions by Enhancing Merkle-Damgård Construction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings, pp. 407-420, 2006, Springer, 3-540-35458-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Merkle-Damgård construction, MBCA, 3C, 3C+ |
21 | Scott Contini, Arjen K. Lenstra, Ron Steinfeld |
VSH, an Efficient and Provable Collision-Resistant Hash Function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings, pp. 165-182, 2006, Springer, 3-540-34546-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Sung Jin Cho 0001, Un-Sook Choi, Yoon-Hee Hwang, Han-Doo Kim |
Modeling Efficient XOR-Based Hash Functions for Cache Memories. ![Search on Bibsonomy](Pics/bibsonomy.png) |
International Conference on Computational Science (1) ![In: Computational Science - ICCS 2006, 6th International Conference, Reading, UK, May 28-31, 2006, Proceedings, Part I, pp. 1067-1070, 2006, Springer, 3-540-34379-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Shiguo Lian, Zhongxuan Liu, Zhen Ren, Haila Wang |
Hash function based on chaotic neural networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS ![In: International Symposium on Circuits and Systems (ISCAS 2006), 21-24 May 2006, Island of Kos, Greece, 2006, IEEE, 0-7803-9389-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Deng Lixin |
A new approach of data hiding within speech based on Hash and Hilbert Transform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSNC ![In: Proceedings of the International Conference on Systems and Networks Communications (ICSNC 2006), October 29 - November 3, 2006, Papeete, Tahiti, French Polynesia, pp. 13, 2006, IEEE Computer Society, 0-7695-2699-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Yi Jiang, Guangtao Xue, Zhaoqing Jia, Jinyuan You |
DTuples: A Distributed Hash Table based Tuple Space Service for Distributed Coordination. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GCC ![In: Grid and Cooperative Computing - GCC 2006, 5th International Conference, Changsha, Hunan, China, 21-23 October 2006, Proceedings, pp. 101-106, 2006, IEEE Computer Society, 0-7695-2694-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Yuichi Sei, Kazutaka Matsuzaki, Shinichi Honiden |
An Algorithm to Reduce the Communication Traffic for Multi-Word Searches in a Distributed Hash Table. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IFIP TCS ![In: Fourth IFIP International Conference on Theoretical Computer Science (TCS 2006), IFIP 19th World Computer Congress, TC-1 Foundations of Computer Science, August 23-24, 2006, Santiago, Chile, pp. 115-129, 2006, Springer, 0-387-34633-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Olaf Landsiedel, Stefan Götz 0001, Klaus Wehrle |
Towards Scalable Mobility in Distributed Hash Tables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Peer-to-Peer Computing ![In: Sixth IEEE International Conference on Peer-to-Peer Computing (P2P 2006), 2-4 October 2006, Cambridge, United Kingdom, pp. 203-209, 2006, IEEE Computer Society, 0-7695-2679-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Rüdiger Martin, Michael Menth, Michael Hemmkeppler |
Accuracy and Dynamics of Hash-Based Load Balancing Algorithms for Multipath Internet Routing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BROADNETS ![In: 3rd International Conference on Broadband Communications, Networks, and Systems (BROADNETS 2006), 1-5 October 2006, San José, California, USA, 2006, IEEE, 978-1-4244-0425-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Dimitris Fotakis 0001, Rasmus Pagh, Peter Sanders 0001, Paul G. Spirakis |
Space Efficient Hash Tables with Worst Case Constant Access Time. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Theory Comput. Syst. ![In: Theory Comput. Syst. 38(2), pp. 229-248, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | JingFeng Li, Yuefei Zhu, Heng Pan, DaWei Wei |
A New Public Key Certificate Revocation Scheme Based on One-Way Hash Chain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WAIM ![In: Advances in Web-Age Information Management, 6th International Conference, WAIM 2005, Hangzhou, China, October 11-13, 2005, Proceedings, pp. 670-675, 2005, Springer, 3-540-29227-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Lars R. Knudsen, Frédéric Muller |
Some Attacks Against a Double Length Hash Proposal. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings, pp. 462-473, 2005, Springer, 3-540-30684-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Kihun Hong, Souhwan Jung, Shyhtsun Felix Wu |
A Hash-Chain Based Authentication Scheme for Fast Handover in Wireless Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 6th International Workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers, pp. 96-107, 2005, Springer, 3-540-31012-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | C. Dods, Nigel P. Smart, Martijn Stam |
Hash Based Digital Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMACC ![In: Cryptography and Coding, 10th IMA International Conference, Cirencester, UK, December 19-21, 2005, Proceedings, pp. 96-115, 2005, Springer, 3-540-30276-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | T. S. Ganesh, T. S. B. Sudarshan |
ASIC Implementation of a Unified Hardware Architecture for Non-Key Based Cryptographic Hash Primitives. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCC (1) ![In: International Symposium on Information Technology: Coding and Computing (ITCC 2005), Volume 1, 4-6 April 2005, Las Vegas, Nevada, USA, pp. 580-585, 2005, IEEE Computer Society, 0-7695-2315-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Akashi Satoh, Tadanobu Inoue |
ASIC-Hardware-Focused Comparison for Hash Functions MD5, RIPEMD-160, and SHS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCC (1) ![In: International Symposium on Information Technology: Coding and Computing (ITCC 2005), Volume 1, 4-6 April 2005, Las Vegas, Nevada, USA, pp. 532-537, 2005, IEEE Computer Society, 0-7695-2315-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Filipe Araújo, Luís E. T. Rodrigues, Jörg Kaiser, Changling Liu, Carlos Mitidieri |
CHR: A Distributed Hash Table for Wireless Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS Workshops ![In: 25th International Conference on Distributed Computing Systems Workshops (ICDCS 2005 Workshops), 6-10 June 2005, Columbus, OH, USA, pp. 407-413, 2005, IEEE Computer Society, 0-7695-2328-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Arnaud Dury |
Auto-adaptive distributed hash tables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GRID ![In: 6th IEEE/ACM International Conference on Grid Computing (GRID 2005), November 13-14, 2005, Seattle, Washington, USA, Proceedings, pp. 268-273, 2005, IEEE Computer Society, 0-7803-9493-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Yevgeniy Dodis, Roberto Oliveira 0001, Krzysztof Pietrzak |
On the Generic Insecurity of the Full Domain Hash. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings, pp. 449-466, 2005, Springer, 3-540-28114-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Pars Mutaf, Claude Castelluccia |
Hash-Based Paging and Location Update Using Bloom Filters. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mob. Networks Appl. ![In: Mob. Networks Appl. 9(6), pp. 627-631, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
concurrent paging, false location update, bloom filters, MIPv6, IP paging |
21 | Giuseppe Ateniese, Breno de Medeiros |
Identity-Based Chameleon Hash and Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography, 8th International Conference, FC 2004, Key West, FL, USA, February 9-12, 2004. Revised Papers, pp. 164-180, 2004, Springer, 3-540-22420-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Mohamed F. Mokbel, Ming Lu, Walid G. Aref |
Hash-Merge Join: A Non-blocking Join Algorithm for Producing Fast and Early Join Results. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDE ![In: Proceedings of the 20th International Conference on Data Engineering, ICDE 2004, 30 March - 2 April 2004, Boston, MA, USA, pp. 251-262, 2004, IEEE Computer Society, 0-7695-2065-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
21 | David Nguyen, Joseph Zambreno, Gokhan Memik |
Flow Monitoring in High-Speed Networks with 2D Hash Tables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FPL ![In: Field Programmable Logic and Application, 14th International Conference , FPL 2004, Leuven, Belgium, August 30-September 1, 2004, Proceedings, pp. 1093-1097, 2004, Springer, 3-540-22989-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Daniela Tulone |
Enhancing Efficiency of Byzantine-Tolerant Coordination Protocols via Hash Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Euro-Par ![In: Euro-Par 2004 Parallel Processing, 10th International Euro-Par Conference, Pisa, Italy, August 31-September 3, 2004, Proceedings, pp. 587-595, 2004, Springer, 3-540-22924-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Di Xiao 0001, Xiaofeng Liao 0001 |
A Combined Hash and Encryption Scheme by Chaotic Neural Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISNN (2) ![In: Advances in Neural Networks - ISNN 2004, International Symposium on Neural Networks, Dalian, China, August 19-21, 2004, Proceedings, Part II, pp. 633-638, 2004, Springer, 3-540-22843-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Frédéric Muller |
The MD2 Hash Function Is Not One-Way. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2004, 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004, Proceedings, pp. 214-229, 2004, Springer, 3-540-23975-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Zongkai Yang, Weimin Lang, Yunmeng Tan |
A New Fair Micropayment System Based on Hash Chain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EEE ![In: 2004 IEEE International Conference on e-Technology, e-Commerce, and e-Services (EEE 04), 29-31 March 2004, Taipei, Taiwan, pp. 139-145, 2004, IEEE Computer Society, 0-7695-2073-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Chad Yoshikawa, Brent N. Chun, Amin Vahdat |
Distributed Hash Queues: Architecture and Design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AP2PC ![In: Agents and Peer-to-Peer Computing, Third International Workshop, AP2PC 2004, New York, NY, USA, July 19, 2004, Revised and Invited Papers, pp. 28-39, 2004, Springer, 3-540-29755-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Philipp Woelfel |
A Construction Method for Optimally Universal Hash Families and Its Consequences for the Existence of RBIBDs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COCOON ![In: Computing and Combinatorics, 10th Annual International Conference, COCOON 2004, Jeju Island, Korea, August 17-20, 2004, Proceedings, pp. 23-32, 2004, Springer, 3-540-22856-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Sylvia Ratnasamy, Brad Karp, Scott Shenker, Deborah Estrin, Ramesh Govindan, Li Yin, Fang Yu 0002 |
Data-Centric Storage in Sensornets with GHT, a Geographic Hash Table. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mob. Networks Appl. ![In: Mob. Networks Appl. 8(4), pp. 427-442, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
sensor networks, performance, distributed systems, algorithms |
21 | Champskud J. Skrepth, Andreas Uhl |
Robust Hash Functions for Visual Data: An Experimental Comparison. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IbPRIA ![In: Pattern Recognition and Image Analysis, First Iberian Conference, IbPRIA 2003, Puerto de Andratx, Mallorca, Spain, June 4-6, 2003, Proceedings, pp. 986-993, 2003, Springer, 3-540-40217-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
21 | Blaise Gassend, G. Edward Suh, Dwaine E. Clarke, Marten van Dijk, Srinivas Devadas |
Caches and Hash Trees for Efficient Memory Integrity Verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HPCA ![In: Proceedings of the Ninth International Symposium on High-Performance Computer Architecture (HPCA'03), Anaheim, California, USA, February 8-12, 2003, pp. 295-306, 2003, IEEE Computer Society, 0-7695-1871-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
21 | John W. Byers, Jeffrey Considine, Michael Mitzenmacher |
Simple Load Balancing for Distributed Hash Tables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPTPS ![In: Peer-to-Peer Systems II, Second International Workshop, IPTPS 2003, Berkeley, CA, USA, February 21-22,2003, Revised Papers, pp. 80-87, 2003, Springer, 3-540-40724-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
21 | C. Kailasanathan, Reihaneh Safavi-Naini, Philip Ogunbona |
Compression Tolerant DCT Based Image Hash. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS Workshops ![In: 23rd International Conference on Distributed Computing Systems Workshops (ICDCS 2003 Workshops), 19-22 May 2003, Providence, RI, USA, pp. 562-567, 2003, IEEE Computer Society, 0-7695-1921-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
21 | Sylvia Ratnasamy, Brad Karp, Li Yin, Fang Yu 0002, Deborah Estrin, Ramesh Govindan, Scott Shenker |
GHT: a geographic hash table for data-centric storage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WSNA ![In: Proceedings of the First ACM International Workshop on Wireless Sensor Networks and Applications, WSNA 2002, Atlanta, Georgia, USA, September 28, 2002, pp. 78-87, 2002, ACM, 1-58113-589-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
21 | Emil Sit, Robert Tappan Morris |
Security Considerations for Peer-to-Peer Distributed Hash Tables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPTPS ![In: Peer-to-Peer Systems, First International Workshop, IPTPS 2002, Cambridge, MA, USA, March 7-8, 2002, Revised Papers, pp. 261-269, 2002, Springer, 3-540-44179-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
21 | Gang Luo 0001, Curt J. Ellmann, Peter J. Haas, Jeffrey F. Naughton |
A scalable hash ripple join algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMOD Conference ![In: Proceedings of the 2002 ACM SIGMOD International Conference on Management of Data, Madison, Wisconsin, USA, June 3-6, 2002, pp. 252-262, 2002, ACM, 1-58113-497-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
World Wide Web (WWW) |
21 | Tetsu Iwata, Kaoru Kurosawa |
On the Universal Hash Functionsin Luby-Rackoff Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2002, 5th International Conference Seoul, Korea, November 28-29, 2002, Revised Papers, pp. 226-236, 2002, Springer, 3-540-00716-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Block/Stream Ciphers, Provable Security, Cryptographic Primitives |
21 | Joël M. Malard, Robert D. Stewart |
Distributed dynamic hash tables using IBM LAPI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SC ![In: Proceedings of the 2002 ACM/IEEE conference on Supercomputing, Baltimore, Maryland, USA, November 16-22, 2002, CD-ROM, pp. 10:1-10:11, 2002, IEEE Computer Society, 0-7695-1524-X. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
21 | John Black, Phillip Rogaway, Thomas Shrimpton |
Black-Box Analysis of the Block-Cipher-Based Hash-Function Constructions from PGV. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2002, 22nd Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 2002, Proceedings, pp. 320-335, 2002, Springer, 3-540-44050-X. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
21 | David Naccache, David Pointcheval, Jacques Stern |
Twin signatures: an alternative to the hash-and-sign paradigm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: CCS 2001, Proceedings of the 8th ACM Conference on Computer and Communications Security, Philadelphia, Pennsylvania, USA, November 6-8, 2001., pp. 20-27, 2001, ACM, 1-58113-385-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
flexible RSA problem, digital signatures, provable security, generic model, discrete logarithm, standard model |
21 | Nan Kyoung Park, Joon Ho Hwang, Pil Joong Lee |
HAS-V: A New Hash Function with Variable Output Length. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 7th Annual International Workshop, SAC 2000, Waterloo, Ontario, Canada, August 14-15, 2000, Proceedings, pp. 202-216, 2000, Springer, 3-540-42069-X. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
21 | Jiri Fridrich |
Robust Hash Functions for Digital Watermarking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCC ![In: 2000 International Symposium on Information Technology (ITCC 2000), 27-29 March 2000, Las Vegas, NV, USA, pp. 178-183, 2000, IEEE Computer Society, 0-7695-0540-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
21 | Kun-Lung Wu, Philip S. Yu |
Local Replication for Proxy Web Caches with Hash Routing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIKM ![In: Proceedings of the 1999 ACM CIKM International Conference on Information and Knowledge Management, Kansas City, Missouri, USA, November 2-6, 1999, pp. 69-76, 1999, ACM, 1-58113-146-1. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
21 | Motomichi Toyama, Akira Ohara |
Hash-based Symmetric Data Structure and Join Algorithm for OLAP Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDEAS ![In: 1999 International Database Engineering and Applications Symposium, IDEAS 1999, Montreal, Canada, August 2-4, 1999, Proceedings, pp. 231-238, 1999, IEEE Computer Society, 0-7695-0265-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
21 | Jeong Han Kim, Daniel R. Simon, Prasad Tetali |
Limits on the Efficiency of One-Way Permutation-Based Hash Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOCS ![In: 40th Annual Symposium on Foundations of Computer Science, FOCS '99, 17-18 October, 1999, New York, NY, USA, pp. 535-542, 1999, IEEE Computer Society, 0-7695-0409-4. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
cryptography, Oracle, complexity theory, relativization |
21 | Sang-Uk Shin, Kyung Hyune Rhee, Jae Woo Yoon |
Hash Functions and the MAC Using All-or-Nothing Property. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography, Second International Workshop on Practice and Theory in Public Key Cryptography, PKC '99, Kamakura, Japan, March 1-3, 1999, Proceedings, pp. 263-275, 1999, Springer, 3-540-65644-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
21 | Bart Preneel |
The State of Cryptographic Hash Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Lectures on Data Security ![In: Lectures on Data Security, Modern Cryptology in Theory and Practice, Summer School, Aarhus, Denmark, July 1998, pp. 158-182, 1998, Springer, 3-540-65757-6. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
21 | Mats Näslund |
Universal Hash Functions & Hard Core Bits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '95, International Conference on the Theory and Application of Cryptographic Techniques, Saint-Malo, France, May 21-25, 1995, Proceeding, pp. 356-366, 1995, Springer, 3-540-59409-4. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
21 | Jürgen Bierbrauer |
A2 Codes from Universal Hash Classes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '95, International Conference on the Theory and Application of Cryptographic Techniques, Saint-Malo, France, May 21-25, 1995, Proceeding, pp. 311-318, 1995, Springer, 3-540-59409-4. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
21 | Jacques Patarin |
Collisions and Inversions for Damgård's Whole Hash Function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28 - December 1, 1994, Proceedings, pp. 307-321, 1994, Springer, 3-540-59339-X. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
21 | Antoine Joux, Louis Granboulan |
A Practical Attack against Knapsack based Hash Functions (Extended Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '94, Workshop on the Theory and Application of Cryptographic Techniques, Perugia, Italy, May 9-12, 1994, Proceedings, pp. 58-66, 1994, Springer, 3-540-60176-7. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
21 | Marc Girault, Jacques Stern |
On the Length of Cryptographic Hash-Values Used in Identification Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '94, 14th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1994, Proceedings, pp. 202-215, 1994, Springer, 3-540-58333-5. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
21 | X. Zhao, Roger G. Johnson, Nigel J. Martin 0001 |
DBJ - A Dynamic Balancing Hash Join Algorithm in Multiprocessor Database Systems (Extented Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDBT ![In: Advances in Database Technology - EDBT'94. 4th International Conference on Extending Database Technology, Cambridge, United Kingdom, March 28-31, 1994, Proceedings, pp. 301-308, 1994, Springer, 3-540-57818-8. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
21 | Jürgen Bierbrauer, Thomas Johansson 0001, Gregory Kabatianskii, Ben J. M. Smeets |
On Families of Hash Functions via Geometric Codes and Concatenation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '93, 13th Annual International Cryptology Conference, Santa Barbara, California, USA, August 22-26, 1993, Proceedings, pp. 331-342, 1993, Springer, 3-540-57766-1. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
21 | Francesca Cesarini, Giovanni Soda |
A Dynamic Hash Method with Signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Database Syst. ![In: ACM Trans. Database Syst. 16(2), pp. 309-337, 1991. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
dynamic hashing, external hashing, generalized spiral storage, signature functions |
21 | Paul Camion, Jacques Patarin |
The Knapsack Hash Function proposed at Crypto'89 can be broken. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings, pp. 39-53, 1991, Springer, 3-540-54620-0. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
21 | Babak Sadeghiyan, Josef Pieprzyk |
A Construction for One Way Hash Functions and Pseudorandom Bit Generators. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings, pp. 431-445, 1991, Springer, 3-540-54620-0. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
Displaying result #601 - #700 of 7013 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ 15][ 16][ >>] |
|