|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 3717 occurrences of 1502 keywords
|
|
|
Results
Found 7025 publication records. Showing 7013 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
21 | Eli Biham, Adi Shamir |
Differential Cryptanalysis of Feal and N-Hash. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings, pp. 1-16, 1991, Springer, 3-540-54620-0. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
21 | Doron Rotem |
Clustered Multiattribute Hash Files. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PODS ![In: Proceedings of the Eighth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, March 29-31, 1989, Philadelphia, Pennsylvania, USA, pp. 225-234, 1989, ACM Press, 0-89791-308-6. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
21 | Ivan Damgård |
A Design Principle for Hash Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings, pp. 416-427, 1989, Springer, 3-540-97317-6. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
21 | Ralph C. Merkle |
One Way Hash Functions and DES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings, pp. 428-446, 1989, Springer, 3-540-97317-6. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
21 | George Markowsky, Larry Carter, Mark N. Wegman |
Analysis of a Universal Class of Hash Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MFCS ![In: Mathematical Foundations of Computer Science 1978, Proceedings, 7th Symposium, Zakopane, Poland, September 4-8, 1978, pp. 345-354, 1978, Springer, 0-387-08921-7. The full citation details ...](Pics/full.jpeg) |
1978 |
DBLP DOI BibTeX RDF |
|
21 | M. H. McKinney |
Variable-length hash area entries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AFIPS National Computer Conference ![In: American Federation of Information Processing Societies: 1977 National Computer Conference, June 13-16, 1977, Dallas, Texas, USA, pp. 371-377, 1977, AFIPS Press, 978-1-4503-7914-4. The full citation details ...](Pics/full.jpeg) |
1977 |
DBLP DOI BibTeX RDF |
|
20 | Yang Xu 0010, Lei Ma, Zhaobo Liu, H. Jonathan Chao |
A Multi-dimensional Progressive Perfect Hashing for High-Speed String Matching. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ANCS ![In: 2011 ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS), Brooklyn, NY, USA, October 3-4, 2011, pp. 167-177, 2011, IEEE Computer Society, 978-1-4577-1454-2. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
Aho-Corasick Automaton, Perfect Hash Table, Multi-string Matching, Hash Collision |
20 | Cong Wang 0014, Tilman Wolf |
Virtual Network Mapping with Traffic Matrices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ANCS ![In: 2011 ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS), Brooklyn, NY, USA, October 3-4, 2011, pp. 225-226, 2011, IEEE Computer Society, 978-1-4577-1454-2. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
Aho-Corasick Automaton, Perfect Hash Table, Multi-string Matching, Hash Collision |
20 | Yvonne Cliff, Colin Boyd, Juan Manuel González Nieto |
How to Extract and Expand Randomness: A Summary and Explanation of Existing Results. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, 7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings, pp. 53-70, 2009, 978-3-642-01956-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
randomness expansion, pseudorandom function (PRF), leftover hash lemma (LHL), key agreement, universal hash function, randomness extraction, key exchange protocols |
20 | Denvil Smith, Nian-Feng Tzeng, Milad M. Ghantous |
FaSReD: Fast and Scalable Resource Discovery in Support of Multiple Resource Range Requirements for Computational Grids. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NCA ![In: Proceedings of The Seventh IEEE International Symposium on Networking Computing and Applications, NCA 2008, July 10-12, 2008, Cambridge, Massachusetts, USA, pp. 45-51, 2008, IEEE Computer Society, 978-0-7695-3192-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
peer-to-peer (P2P) structures, prefix hash trees (PHTs), search keys, distributed hash tables (DHTs), performance measures, resource discovery, Computational Grids, range queries |
20 | Cynthia Dwork, Moni Naor |
An Efficient Existentially Unforgeable Signature Scheme and Its Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 11(3), pp. 187-208, 1998. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
One-way hash mbox{functions}, One-way hash mbox{functions}, Authentication, Authentication, Cryptography, Cryptography, Digital signatures, Digital signatures, Key words, Unforgeability, Unforgeability |
20 | Weijia Shang, José A. B. Fortes |
On Time Mapping of Uniform Dependence Algorithms into Lower Dimensional Processor Arrays. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 3(3), pp. 350-363, 1992. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
adaptive-hash join algorithm, hybrid-hash, parallel algorithms, hypercube networks, file organisation, nested-loop, hypercube multicomputer |
20 | Nan Hua, Eric Norige, Sailesh Kumar, Bill Lynch |
Non-crypto Hardware Hash Functions for High Performance Networking ASICs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ANCS ![In: 2011 ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS), Brooklyn, NY, USA, October 3-4, 2011, pp. 156-166, 2011, IEEE Computer Society, 978-1-4577-1454-2. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
Networking ASIC, Evaluation, Hash Function |
20 | Xiaohong Zhang, Yixian Yang, Lixiang Li 0001, Haipeng Peng |
An Extensible Hash Function Construction Based on Embedded Chaos Maps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIT ![In: 10th IEEE International Conference on Computer and Information Technology, CIT 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010, pp. 2407-2414, 2010, IEEE Computer Society, 978-0-7695-4108-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
chaos maps, embedded scheme, Hash function, security analysis |
20 | Youjun Bu, Hong Guo, Hongchao Hu, Binqiang Wang |
A Traffic Splitting Algorithm Based on Dual Hash Table for Multi-path Internet Routing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MVHI ![In: 2010 International Conference on Machine Vision and Human-machine Interface, MVHI 2010, Kaifeng, China, April 24-25, 2010, pp. 397-400, 2010, IEEE Computer Soceity, 978-0-7695-4009-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Dual hash table, flow mapping, load balancing |
20 | Emad Abd-Elrahman, Mohamed Abid, Hossam Afifi |
Video Streaming Security: Window-Based Hash Chain Signature Combines with Redundancy Code - YouTube Scenario as an Internet Case Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISM ![In: 12th IEEE International Symposium on Multimedia, ISM 2010, Taichung, Taiwan, December 13-15, 2010, pp. 33-40, 2010, IEEE Computer Society, 978-1-4244-8672-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Robustness, Digital Signature, Video Streaming, Hash Chain, Redundancy Codes |
20 | Zhaoqing Liu, Qiong Li, Hui Zhang, Xiyuan Peng |
An Image Structure Information Based Robust Hash for Tamper Detection and Localization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IIH-MSP ![In: Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), Darmstadt, Germany, 15-17 October, 2010, Proceedings, pp. 430-433, 2010, IEEE Computer Society, 978-1-4244-8378-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Tamper Localization, Image Authentication, Tamper Detection, Robust Hash |
20 | Atsushi Takeda, Seiya Nakayama, Gen Kitagata, Debasish Chakraborty, Kazuo Hashimoto, Norio Shiratori |
Hash-Based Distributed Public Key Infrastructure for Ubiquitous Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISIS ![In: CISIS 2010, The Fourth International Conference on Complex, Intelligent and Software Intensive Systems, Krakow, Poland, 15-18 February 2010, pp. 376-383, 2010, IEEE Computer Society, 978-0-7695-3967-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
distributed hash table, overlay network, peer-to-peer network, public key infrastructure |
20 | Biming Tian, Song Han 0004, Tharam S. Dillon |
A Key Management Scheme for Heterogeneous Sensor Networks Using Keyed-Hash Chain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MSN ![In: MSN 2009, The Fifth International Conference on Mobile Ad-hoc and Sensor Networks, Wu Yi Mountain, Fujian, China , December 14-16, 2009, pp. 448-456, 2009, IEEE Computer Society, 978-0-7695-3935-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
keyed-hash function, key management, key predistribution |
20 | Yang Sun |
Robust Image Hash Based on Cyclic Coding the Distributed Features. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HIS (2) ![In: 9th International Conference on Hybrid Intelligent Systems (HIS 2009), August 12-14, 2009, Shenyang, China, pp. 441-444, 2009, IEEE Computer Society, 978-0-7695-3745-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Robust, distributed, hash, cyclic |
20 | Gang Chen 0018, Guohui Li, Bing Yang 0002, Xianghong Tang, Hui Chen |
Progressive Hash-Merge Join Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PACIIA (2) ![In: PACIIA 2008, Volume 2, 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application, 19-20 December 2008, Wuhan, China, pp. 117-121, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
hash-merge, replacement selection tree, external join, unreliable network, non-blocking |
20 | Julien Bringer, Hervé Chabanne, Thomas Icart |
Improved Privacy of the Tree-Based Hash Protocols Using Physically Unclonable Function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks, 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008. Proceedings, pp. 77-91, 2008, Springer, 978-3-540-85854-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Tree-Based Hash Protocol, POK, Privacy, RFID tags, PUF |
20 | Qiong Li, Jing Wu, Xin He |
Content-Based Audio Retrieval Using Perceptual Hash. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IIH-MSP ![In: 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), Harbin, China, 15-17 August 2008, Proceedings, pp. 791-794, 2008, IEEE Computer Society, 978-0-7695-3278-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
content-based retrieval, audio retrieval, perceptual hash |
20 | Phillip Rogaway, John P. Steinberger |
Constructing Cryptographic Hash Functions from Fixed-Key Blockciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedings, pp. 433-450, 2008, Springer, 978-3-540-85173-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
blockcipher-based hashing, collision-resistant hashing, cryptographic hash functions, compression functions, ideal-cipher model |
20 | Andrew Brampton, Andrew MacQuire, Idris A. Rai, Nicholas J. P. Race, Laurent Mathy |
Stealth distributed hash table: unleashing the real potential of peer-to-peer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoNEXT ![In: Proceedings of the 2005 ACM Conference on Emerging Network Experiment and Technology, CoNEXT 2005, Toulouse, France, October 24-27, 2005, pp. 230-231, 2005, ACM, 1-59593-197-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
stealth DHT, peer-to-peer, distributed hash tables |
20 | Vebjørn Moen, Håvard Raddum, Kjell Jørgen Hole |
Weaknesses in the temporal key hash of WPA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGMOBILE Mob. Comput. Commun. Rev. ![In: ACM SIGMOBILE Mob. Comput. Commun. Rev. 8(2), pp. 76-83, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
MIC, Michael, temporal key hash, 802.11, WPA, TKIP |
20 | Sung-Woon Lee, Hyun-Sung Kim 0001, Kee-Young Yoo |
Cryptanalysis of a user authentication scheme using hash functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGOPS Oper. Syst. Rev. ![In: ACM SIGOPS Oper. Syst. Rev. 38(1), pp. 24-28, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
authentication, cryptography, hash function, password, guessing attack |
20 | Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo |
A secure user authentication scheme using hash functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGOPS Oper. Syst. Rev. ![In: ACM SIGOPS Oper. Syst. Rev. 38(2), pp. 62-68, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
security, authentication, cryptography, hash function, password |
20 | Anwitaman Datta, Sarunas Girdzijauskas, Karl Aberer |
On de Bruijn Routing in Distributed Hash Tables: There and Back Again. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Peer-to-Peer Computing ![In: 4th International Conference on Peer-to-Peer Computing (P2P 2004), 15-17 August 2004, Zurich, Switzerland, pp. 159-166, 2004, IEEE Computer Society, 0-7695-2156-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Storage Load Balancing, Routing, Distributed Hash Tables, de Bruijn networks |
20 | Reihaneh Safavi-Naini, Huaxiong Wang |
New constructions for multicast re-keying schemes using perfect hash families. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: CCS 2000, Proceedings of the 7th ACM Conference on Computer and Communications Security, Athens, Greece, November 1-4, 2000., pp. 228-234, 2000, ACM, 1-58113-203-4. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
perfect hash family, broadcast encryption, secure multicasting |
20 | Paolino Di Felice, Ugo Madama |
Reducing the Storage Requirements of a Perfect Hash Function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 10(6), pp. 1005-1007, 1998. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
array packing, memory requirements, Perfect hash function |
20 | Sanjiv K. Bhatia, Chaman L. Sabharwal |
Near perfect hash table for image databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 1996 ACM Symposium on Applied Computing, SAC'96, Philadelphia, PA, USA, February 17-19, 1996, pp. 442-446, 1996, ACM, 0-89791-820-7. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
image database indexing, hash table, 2D string |
20 | Ming-Syan Chen, Ming-Ling Lo, Philip S. Yu, Honesty C. Young |
Applying Segmented Right-Deep Trees to Pipelining Multiple Hash Joins. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 7(4), pp. 656-668, 1995. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
bushy trees, right-deep trees, Pipelining, parallel query processing, hash joins |
20 | Chaman L. Sabharwal, Sanjiv K. Bhatia |
A perfect hash function for image database indexing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 1994 ACM Symposium on Applied Computing, SAC'94, Phoenix, AZ, USA, March 6-8, 1994, pp. 534-538, 1994, ACM, 0-89791-647-6. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
image databases, perfect hash functions, 2D strings |
20 | Miklós Ajtai, Noga Alon, Jehoshua Bruck, Robert Cypher, Ching-Tien Ho, Moni Naor, Endre Szemerédi |
Fault Tolerant Graphs, Perfect Hash Functions and Disjoint Paths ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOCS ![In: 33rd Annual Symposium on Foundations of Computer Science, Pittsburgh, Pennsylvania, USA, 24-27 October 1992, pp. 693-702, 1992, IEEE Computer Society, 0-8186-2900-2. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
k-fault tolerant graph, performance degradation, disjoint paths, perfect hash functions |
20 | Alan Siegel |
On Universal Classes of Fast High Performance Hash Functions, Their Time-Space Tradeoff, and Their Applications (Extended Abstract) ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOCS ![In: 30th Annual Symposium on Foundations of Computer Science, Research Triangle Park, North Carolina, USA, 30 October - 1 November 1989, pp. 20-25, 1989, IEEE Computer Society, 0-8186-1982-1. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
multiplicative penalty, universal classes, probabilistic argument, random words, explicit algorithm, double hashing, universal functions, T-time PRAM algorithm, lower bound, hash functions, Omega network, time-space tradeoff |
20 | John G. Cleary |
Compact Hash Tables Using Bidirectional Linear Probing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 33(9), pp. 828-834, 1984. The full citation details ...](Pics/full.jpeg) |
1984 |
DBLP DOI BibTeX RDF |
searchfing, bidirectional linear probing, hash storage, memory compaction, open addressing, information retrieval, performance analysis, scatter storage, Address calculation |
20 | Norbert Tihanyi, Tamás Bisztray, Bertalan Borsos, Sebastien Raveau |
Privacy-Preserving Password Cracking: How a Third Party Can Crack Our Password Hash Without Learning the Hash Value or the Cleartext. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 19, pp. 2981-2996, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
20 | Norbert Tihanyi, Tamás Bisztray, Bertalan Borsos, Sebastien Raveau |
Privacy-Preserving Password Cracking: How a Third Party Can Crack Our Password Hash Without Learning the Hash Value or the Cleartext. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2306.08740, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Itay Bookstein, Boaz Tsaban |
TS-Hash: a lightweight cryptographic hash family based on Galois LFSRs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2023, pp. 179, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
20 | Vincent Cheval, Cas Cremers, Alexander Dax, Lucca Hirschi, Charlie Jacomme, Steve Kremer |
Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
USENIX Security Symposium ![In: 32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023, pp. 5899-5916, 2023, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
20 | Shlomi Dolev, Avraam Yagudaev, Moti Yung |
HBSS: (Simple) Hash-Based Stateless Signatures - Hash All the Way to the Rescue! - (Preliminary Version). ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSCML ![In: Cyber Security, Cryptology, and Machine Learning - 7th International Symposium, CSCML 2023, Be'er Sheva, Israel, June 29-30, 2023, Proceedings, pp. 389-397, 2023, Springer, 978-3-031-34670-5. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Xiaohan Sun, Jiting Zhou |
Deep Perceptual Hash Based on Hash Center for Image Copyright Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 10, pp. 120551-120562, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Darshana Upadhyay, Nupur Gaikwad, Marzia Zaman, Srinivas Sampalli |
Investigating the Avalanche Effect of Various Cryptographically Secure Hash Functions and Hash-Based Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 10, pp. 112472-112486, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Abdelrahman AlMahmoud, Ernesto Damiani, Hadi Otrok |
Hash-Comb: A Hierarchical Distance-Preserving Multi-Hash Data Representation for Collaborative Analytics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 10, pp. 34393-34403, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
20 | William Kuszmaul |
A Hash Table Without Hash Functions, and How to Get the Most Out of Your Random Bits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2209.06038, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Vincent Cheval, Cas Cremers, Alexander Dax, Lucca Hirschi, Charlie Jacomme, Steve Kremer |
Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2022, pp. 1314, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
20 | Mayuresh Sunil Pardeshi, Ruey-Kai Sheu, Shyan-Ming Yuan |
Hash-Chain Fog/Edge: A Mode-Based Hash-Chain for Secured Mutual Authentication Protocol Using Zero-Knowledge Proofs in Fog/Edge. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 22(2), pp. 607, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Chen Zhong, Prajwal Challa, Xingsheng Zhao, Song Jiang 0001 |
Buffered Hash Table: Leveraging DRAM to Enhance Hash Indexes in the Persistent Memory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NVMSA ![In: 11th IEEE Non-Volatile Memory Systems and Applications Symposium, NVMSA 2022, Taipei, Taiwan, August 23-25, 2022, pp. 8-13, 2022, IEEE, 978-1-6654-5078-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
20 | William Kuszmaul |
A Hash Table Without Hash Functions, and How to Get the Most Out of Your Random Bits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOCS ![In: 63rd IEEE Annual Symposium on Foundations of Computer Science, FOCS 2022, Denver, CO, USA, October 31 - November 3, 2022, pp. 991-1001, 2022, IEEE, 978-1-6654-5519-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Yaofeng Chen, Chunyang Zhang, Long Ye, Xiaogang Peng, Meikang Qiu, Weipeng Cao |
W-Hash: A Novel Word Hash Clustering Algorithm for Large-Scale Chinese Short Text Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KSEM (3) ![In: Knowledge Science, Engineering and Management - 15th International Conference, KSEM 2022, Singapore, August 6-8, 2022, Proceedings, Part III, pp. 528-539, 2022, Springer, 978-3-031-10988-1. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Peter Stolz, Sebastian Roth, Ben Stock |
To hash or not to hash: A security assessment of CSP's unsafe-hashes expression. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SP (Workshops) ![In: 43rd IEEE Security and Privacy, SP Workshops 2022, San Francisco, CA, USA, May 22-26, 2022, pp. 1-12, 2022, IEEE, 978-1-6654-9643-8. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Dmitrii I. Koshelev |
How to hash onto 픾2 and not to hash onto 픾1 for pairing-friendly curves. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2021, pp. 1082, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
20 | Xu An Wang 0001, Yunxuan Su, Jindan Zhang |
Cryptanalysis of Double-trapdoor Hash Function and Multi-Trapdoor Hash Function Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NaNA ![In: 2021 International Conference on Networking and Network Applications, NaNA 2021, Lijiang City, China, October 29 - Nov. 1, 2021, pp. 278-281, 2021, IEEE, 978-1-6654-4158-2. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
20 | Haiting Zhu, Junmei Wan, Nan Li, Yingying Deng, Gaofeng He, Jing Guo, Lu Zhang |
Odd-Even Hash Algorithm: A Improvement of Cuckoo Hash Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CBD ![In: Ninth International Conference on Advanced Cloud and Big Data, CBD 2021, Xi'an, China, March 26-27, 2022, pp. 1-6, 2021, IEEE, 978-1-6654-0745-8. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
20 | Yann Connan 0001 |
Contribution à la cryptographie post-quantique basée sur les codes correcteurs d'erreurs en métrique rang : Hash Proof Systems et cryptographie à bas coût. (Contribution to post-quantum code-based cryptography in rank metric : Hash Proof Systems and lightweight cryptography). ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2021 |
RDF |
|
20 | Lkhagvadorj Battulga, Sang-Hyun Lee, Aziz Nasridinov, Kwan-Hee Yoo |
Hash-tree PCA: accelerating PCA with hash-based grouping. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Supercomput. ![In: J. Supercomput. 76(10), pp. 8248-8264, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
20 | Xing Wei, Huiqi Hu, Xuan Zhou 0001, Aoying Zhou |
A Chunk-Based Hash Table Caching Method for In-Memory Hash Joins. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISE (2) ![In: Web Information Systems Engineering - WISE 2020 - 21st International Conference, Amsterdam, The Netherlands, October 20-24, 2020, Proceedings, Part II, pp. 376-389, 2020, Springer, 978-3-030-62007-3. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
20 | Pawel Czarnul, Grzegorz Golaszewski, Grzegorz Jereczek, Maciej Maciejewski |
Development and benchmarking a parallel Data AcQuisition framework using MPI with hash and hash+tree structures in a cluster environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPDC ![In: 19th International Symposium on Parallel and Distributed Computing, ISPDC 2020, Warsaw, Poland, July 5-8, 2020, pp. 164-171, 2020, IEEE, 978-1-7281-8946-8. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
20 | Gang Liu, Peng Wang 0009, Rong Wei, Dingfeng Ye |
Revisiting Construction of Online Cipher in Hash-ECB-Hash Structure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology - 16th International Conference, Inscrypt 2020, Guangzhou, China, December 11-14, 2020, Revised Selected Papers, pp. 491-503, 2020, Springer, 978-3-030-71851-0. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
20 | Norbert Tihanyi, Bertalan Borsos |
The Theory and Practice of Magic Hash Based Attacks on Lightweight Cryptographic Hash Functions in Complex IoT Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SpaCCS Workshops ![In: Security, Privacy, and Anonymity in Computation, Communication, and Storage - SpaCCS 2020 International Workshops, Nanjing, China, December 18-20, 2020, Proceedings, pp. 93-107, 2020, Springer, 978-3-030-68883-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
20 | Rui Zong, Xiaoyang Dong, Xiaoyun Wang 0001 |
Collision Attacks on Round-Reduced Gimli-Hash/Ascon-Xof/Ascon-Hash. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2019, pp. 1115, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
20 | Martin Dietzfelbinger, Jörg Keller 0001 |
Determining Minimum Hash Width for Hash Chains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CECC ![In: Proceedings of the Third Central European Cybersecurity Conference, CECC 2019, Munich, Germany, November 14-15, 2019, pp. 18:1-18:5, 2019, ACM, 978-1-4503-7296-1. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
20 | Jie Jiang 0008, Yibo Yan, Mengyu Zhang, Binchao Yin, Yumeng Jiang, Tong Yang 0003, Xiaoming Li 0001, Tengjiao Wang |
Shifting Hash Table: An Efficient Hash Table with Delicate Summary. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GLOBECOM Workshops ![In: 2019 IEEE Globecom Workshops, Waikoloa, HI, USA, December 9-13, 2019, pp. 1-6, 2019, IEEE, 978-1-7281-0960-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
20 | Mehran Mozaffari Kermani, Reza Azarderakhsh, Ausmita Sarker, Amir Jalali |
Efficient and Reliable Error Detection Architectures of Hash-Counter-Hash Tweakable Enciphering Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Embed. Comput. Syst. ![In: ACM Trans. Embed. Comput. Syst. 17(2), pp. 54:1-54:19, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
20 | Shupeng Su, Chao Zhang 0001, Kai Han 0002, Yonghong Tian |
Greedy Hash: Towards Fast Optimization for Accurate Hash Coding in CNN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NeurIPS ![In: Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems 2018, NeurIPS 2018, December 3-8, 2018, Montréal, Canada., pp. 806-815, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
20 | Yuichi Kaji, Jason Paul Cruz, Yoshio Yatani |
Hash-Based Signature with Constant-Sum Fingerprinting and Partial Construction of Hash Chains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICETE (2) ![In: Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, ICETE 2018 - Volume 2: SECRYPT, Porto, Portugal, July 26-28, 2018., pp. 463-470, 2018, SciTePress, 978-989-758-319-3. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
20 | Nicolas Le Scouarnec |
Cuckoo++ hash tables: high-performance hash tables for networking applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ANCS ![In: Proceedings of the 2018 Symposium on Architectures for Networking and Communications Systems, ANCS 2018, Ithaca, NY, USA, July 23-24, 2018, pp. 41-54, 2018, ACM. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
20 | Nicolas Le Scouarnec |
Cuckoo++ Hash Tables: High-Performance Hash Tables for Networking Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1712.09624, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
20 | Pornchai Assamongkol, Suphakant Phimoltares, Sasipa Panthuwadeethorn |
Enhancing trustworthy of document using a combination of image hash and cryptographic hash. ![Search on Bibsonomy](Pics/bibsonomy.png) |
JCSSE ![In: 14th International Joint Conference on Computer Science and Software Engineering, JCSSE 2017, NakhonSiThammarat, Thailand, July 12-14, 2017, pp. 1-6, 2017, IEEE, 978-1-5090-4834-2. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
20 | Tong Yang 0003, Binchao Yin, Hang Li, Muhammad Shahzad 0001, Steve Uhlig, Bin Cm, Xiaoming Li 0001 |
Rectangular hash table: Bloom filter and bitmap assisted hash table with high speed. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE BigData ![In: 2017 IEEE International Conference on Big Data (IEEE BigData 2017), Boston, MA, USA, December 11-14, 2017, pp. 837-846, 2017, IEEE Computer Society, 978-1-5386-2715-0. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
20 | Zachary W. Parchman, Ferrol Aderholdt, Manjunath Gorentla Venkata |
SharP Hash: A High-Performing Distributed Hash for Extreme-Scale Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CLUSTER ![In: 2017 IEEE International Conference on Cluster Computing, CLUSTER 2017, Honolulu, HI, USA, September 5-8, 2017, pp. 647-648, 2017, IEEE Computer Society, 978-1-5386-2326-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
20 | Puliparambil Megha Mukundan, Sindhu Manayankath, Chungath Srinivasan, Madathil Sethumadhavan |
Hash-One: a lightweight cryptographic hash function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IET Inf. Secur. ![In: IET Inf. Secur. 10(5), pp. 225-231, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
20 | Iris Anshel, Derek Atkins, Dorian Goldfeld, Paul E. Gunnells |
Hickory Hash(TM): Implementing an Instance of an Algebraic Eraser(TM) Hash Function on an MSP430 Microcontroller. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2016, pp. 1052, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
20 | Joseph Jupin, Justin Y. Shi, Eduard C. Dragut |
PSH: A probabilistic signature hash method with hash neighborhood candidate generation for fast edit-distance string comparison on big data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE BigData ![In: 2016 IEEE International Conference on Big Data (IEEE BigData 2016), Washington DC, USA, December 5-8, 2016, pp. 122-127, 2016, IEEE Computer Society, 978-1-4673-9005-7. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
20 | Behzad Salami 0001, Oriol Arcas-Abella, Nehir Sönmez, Osman S. Unsal, Adrián Cristal Kestelman |
Accelerating Hash-Based Query Processing Operations on FPGAs by a Hash Table Caching Technique. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CARLA ![In: High Performance Computing - Third Latin American Conference, CARLA 2016, Mexico City, Mexico, August 29 - September 2, 2016, Revised Selected Papers, pp. 131-145, 2016, 978-3-319-57971-9. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
20 | Bo-Kyeong Kim, Sang-Won Lee 0001, Dong-Ho Lee |
h-Hash: A Hash Index Structure for Flash-Based Solid State Drives. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Circuits Syst. Comput. ![In: J. Circuits Syst. Comput. 24(9), pp. 1550128:1-1550128:32, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
20 | Ashwin Jha, Mridul Nandi |
Some Cryptanalytic Results on Zipper Hash and Concatenated Hash. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2015, pp. 973, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
20 | Zhelei Sun, Peng Wang 0009, Liting Zhang |
Weak-Key and Related-Key Analysis of Hash-Counter-Hash Tweakable Enciphering Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings, pp. 3-19, 2015, Springer, 978-3-319-19961-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
20 | Mehran Mozaffari Kermani, Reza Azarderakhsh |
Reliable hash trees for post-quantum stateless cryptographic hash-based signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DFTS ![In: 2015 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, DFTS 2015, Amherst, MA, USA, October 12-14, 2015, pp. 103-108, 2015, IEEE Computer Society, 978-1-4799-8606-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
20 | Avradip Mandal, Arnab Roy 0001 |
Relational Hash: Probabilistic Hash for Verifying Relations, Secure Against Forgery and More. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO (1) ![In: Advances in Cryptology - CRYPTO 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part I, pp. 518-537, 2015, Springer, 978-3-662-47988-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
20 | Gülüzar Çit |
Sanal heykeltraşlıkta optimize edilmiş hash-temelli octree veri yapısının kullanılması (Using an optimized hash-based octree data structure in virtual sculpting) ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2015 |
RDF |
|
20 | Tahir Ahmad, Usman Younis |
Randomness testing of non-cryptographic hash functions for real-time hash table based storage and look-up of URLs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Netw. Comput. Appl. ![In: J. Netw. Comput. Appl. 41, pp. 197-205, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
20 | Tyler Clemons, S. M. Faisal, Shirish Tatikonda, Charu C. Aggarwal, Srinivasan Parthasarathy 0001 |
One, Two, Hash! Counting Hash Tables for Flash Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODS ![In: Proceedings of the 1st IKDD Conference on Data Sciences, Delhi, India, March 21 - 23, 2014, pp. 1-10, 2014, ACM, 978-1-4503-2475-5. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
20 | Sebastian Bittl |
Efficient Construction of Infinite Length Hash Chains with Perfect Forward Secrecy Using Two Independent Hash Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECRYPT ![In: SECRYPT 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014, pp. 213-220, 2014, SciTePress, 978-989-758-045-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
20 | Yevgeniy Dodis, Thomas Ristenpart, John P. Steinberger, Stefano Tessaro |
To Hash or Not to Hash Again? (In)differentiability Results for H2 and HMAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2013, pp. 382, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
20 | Ahto Buldas, Risto Laanoja |
Security Proofs for Hash Tree Time-Stamping Using Hash Functions with Small Output Size. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings, pp. 235-250, 2013, Springer, 978-3-642-39058-6. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
20 | Tyler Clemons, S. M. Faisal, Shirish Tatikonda, Charu C. Aggarwal, Srinivasan Parthasarathy 0001 |
Hash in a flash: Hash tables for flash devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE BigData ![In: 2013 IEEE International Conference on Big Data (IEEE BigData 2013), 6-9 October 2013, Santa Clara, CA, USA, pp. 7-14, 2013, IEEE Computer Society, 978-1-4799-1292-6. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
20 | Bart Mennink |
Provable Security of Cryptographic Hash Functions (Bewijsbare veiligheid van cryptografische hashfuncties) ; Provable Security of Cryptographic Hash Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2013 |
RDF |
|
20 | João Pedro Barreto 0002, Luís Veiga, Paulo Ferreira 0001 |
Hash challenges: Stretching the limits of compare-by-hash in distributed data deduplication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Process. Lett. ![In: Inf. Process. Lett. 112(10), pp. 380-385, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
20 | Tyler Clemons, S. M. Faisal, Shirish Tatikonda, Charu C. Aggarwal, Srinivasan Parthasarathy 0001 |
Hash in a Flash: Hash Tables for Solid State Devices ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1211.4521, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
20 | Souradyuti Paul, Ekawat Homsirikamol, Kris Gaj |
A Novel Permutation-based Hash Mode of Operation FP and the Hash Function SAMOSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2012, pp. 597, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
20 | Eleazar Jiménez Serrano |
On the design of special hash functions for multiple hash tables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCE ![In: 9th International Conference on Electrical Engineering, Computing Science and Automatic Control, CCE 2012, Mexico City, Mexico, September 26-28, 2012, pp. 1-5, 2012, IEEE, 978-1-4673-2170-9. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
20 | R. Joshua Tobin, David Malone |
Hash pile ups: Using collisions to identify unknown hash functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRiSIS ![In: 7th International Conference on Risks and Security of Internet and Systems, CRiSIS 2012, Cork, Ireland, October 10-12, 2012, pp. 1-6, 2012, IEEE Computer Society, 978-1-4673-3087-9. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
20 | Souradyuti Paul, Ekawat Homsirikamol, Kris Gaj |
A Novel Permutation-Based Hash Mode of Operation FP and the Hash Function SAMOSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2012, 13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings, pp. 509-527, 2012, Springer, 978-3-642-34930-0. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
20 | Yevgeniy Dodis, Thomas Ristenpart, John P. Steinberger, Stefano Tessaro |
To Hash or Not to Hash Again? (In)Differentiability Results for H 2 and HMAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings, pp. 348-366, 2012, Springer, 978-3-642-32008-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
20 | Karel Wouters |
Hash-Chain based Protocols for Time-Stamping and Secure Logging: Formats, Analysis and Design (Hash-keten gebaseerde protocollen voor tijdszegels en beveiligde logbestanden: formaten, analyse en ontwerp). (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2012 |
RDF |
|
20 | Bart Preneel |
MASH Hash Functions (Modular Arithmetic Secure Hash). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Cryptography and Security (2nd Ed.) ![In: Encyclopedia of Cryptography and Security, 2nd Ed., pp. 761, 2011, Springer, 978-1-4419-5905-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
20 | |
R-hash : Hash Function Using Random Quadratic Polynomials Over GF(2). ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2011, pp. 450, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
20 | |
GB-hash : Hash Functions Using Groebner Basis ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1011.5534, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
|
|