The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Hash with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1968-1973 (17) 1974-1977 (20) 1978-1980 (18) 1981-1982 (16) 1983-1984 (19) 1985 (16) 1986-1987 (16) 1988-1989 (33) 1990 (33) 1991 (27) 1992 (38) 1993 (28) 1994 (44) 1995 (33) 1996 (36) 1997 (47) 1998 (42) 1999 (62) 2000 (56) 2001 (85) 2002 (139) 2003 (183) 2004 (329) 2005 (415) 2006 (468) 2007 (493) 2008 (494) 2009 (456) 2010 (240) 2011 (205) 2012 (223) 2013 (226) 2014 (182) 2015 (188) 2016 (241) 2017 (229) 2018 (227) 2019 (260) 2020 (232) 2021 (255) 2022 (304) 2023 (278) 2024 (60)
Publication types (Num. hits)
article(2517) book(3) incollection(69) inproceedings(4361) phdthesis(63)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 3717 occurrences of 1502 keywords

Results
Found 7025 publication records. Showing 7013 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
21Eli Biham, Adi Shamir Differential Cryptanalysis of Feal and N-Hash. Search on Bibsonomy EUROCRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
21Doron Rotem Clustered Multiattribute Hash Files. Search on Bibsonomy PODS The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
21Ivan Damgård A Design Principle for Hash Functions. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
21Ralph C. Merkle One Way Hash Functions and DES. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
21George Markowsky, Larry Carter, Mark N. Wegman Analysis of a Universal Class of Hash Functions. Search on Bibsonomy MFCS The full citation details ... 1978 DBLP  DOI  BibTeX  RDF
21M. H. McKinney Variable-length hash area entries. Search on Bibsonomy AFIPS National Computer Conference The full citation details ... 1977 DBLP  DOI  BibTeX  RDF
20Yang Xu 0010, Lei Ma, Zhaobo Liu, H. Jonathan Chao A Multi-dimensional Progressive Perfect Hashing for High-Speed String Matching. Search on Bibsonomy ANCS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF Aho-Corasick Automaton, Perfect Hash Table, Multi-string Matching, Hash Collision
20Cong Wang 0014, Tilman Wolf Virtual Network Mapping with Traffic Matrices. Search on Bibsonomy ANCS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF Aho-Corasick Automaton, Perfect Hash Table, Multi-string Matching, Hash Collision
20Yvonne Cliff, Colin Boyd, Juan Manuel González Nieto How to Extract and Expand Randomness: A Summary and Explanation of Existing Results. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF randomness expansion, pseudorandom function (PRF), leftover hash lemma (LHL), key agreement, universal hash function, randomness extraction, key exchange protocols
20Denvil Smith, Nian-Feng Tzeng, Milad M. Ghantous FaSReD: Fast and Scalable Resource Discovery in Support of Multiple Resource Range Requirements for Computational Grids. Search on Bibsonomy NCA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF peer-to-peer (P2P) structures, prefix hash trees (PHTs), search keys, distributed hash tables (DHTs), performance measures, resource discovery, Computational Grids, range queries
20Cynthia Dwork, Moni Naor An Efficient Existentially Unforgeable Signature Scheme and Its Applications. Search on Bibsonomy J. Cryptol. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF One-way hash mbox{functions}, One-way hash mbox{functions}, Authentication, Authentication, Cryptography, Cryptography, Digital signatures, Digital signatures, Key words, Unforgeability, Unforgeability
20Weijia Shang, José A. B. Fortes On Time Mapping of Uniform Dependence Algorithms into Lower Dimensional Processor Arrays. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 1992 DBLP  DOI  BibTeX  RDF adaptive-hash join algorithm, hybrid-hash, parallel algorithms, hypercube networks, file organisation, nested-loop, hypercube multicomputer
20Nan Hua, Eric Norige, Sailesh Kumar, Bill Lynch Non-crypto Hardware Hash Functions for High Performance Networking ASICs. Search on Bibsonomy ANCS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF Networking ASIC, Evaluation, Hash Function
20Xiaohong Zhang, Yixian Yang, Lixiang Li 0001, Haipeng Peng An Extensible Hash Function Construction Based on Embedded Chaos Maps. Search on Bibsonomy CIT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF chaos maps, embedded scheme, Hash function, security analysis
20Youjun Bu, Hong Guo, Hongchao Hu, Binqiang Wang A Traffic Splitting Algorithm Based on Dual Hash Table for Multi-path Internet Routing. Search on Bibsonomy MVHI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Dual hash table, flow mapping, load balancing
20Emad Abd-Elrahman, Mohamed Abid, Hossam Afifi Video Streaming Security: Window-Based Hash Chain Signature Combines with Redundancy Code - YouTube Scenario as an Internet Case Study. Search on Bibsonomy ISM The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Robustness, Digital Signature, Video Streaming, Hash Chain, Redundancy Codes
20Zhaoqing Liu, Qiong Li, Hui Zhang, Xiyuan Peng An Image Structure Information Based Robust Hash for Tamper Detection and Localization. Search on Bibsonomy IIH-MSP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Tamper Localization, Image Authentication, Tamper Detection, Robust Hash
20Atsushi Takeda, Seiya Nakayama, Gen Kitagata, Debasish Chakraborty, Kazuo Hashimoto, Norio Shiratori Hash-Based Distributed Public Key Infrastructure for Ubiquitous Environments. Search on Bibsonomy CISIS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF distributed hash table, overlay network, peer-to-peer network, public key infrastructure
20Biming Tian, Song Han 0004, Tharam S. Dillon A Key Management Scheme for Heterogeneous Sensor Networks Using Keyed-Hash Chain. Search on Bibsonomy MSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF keyed-hash function, key management, key predistribution
20Yang Sun Robust Image Hash Based on Cyclic Coding the Distributed Features. Search on Bibsonomy HIS (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Robust, distributed, hash, cyclic
20Gang Chen 0018, Guohui Li, Bing Yang 0002, Xianghong Tang, Hui Chen Progressive Hash-Merge Join Algorithm. Search on Bibsonomy PACIIA (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF hash-merge, replacement selection tree, external join, unreliable network, non-blocking
20Julien Bringer, Hervé Chabanne, Thomas Icart Improved Privacy of the Tree-Based Hash Protocols Using Physically Unclonable Function. Search on Bibsonomy SCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Tree-Based Hash Protocol, POK, Privacy, RFID tags, PUF
20Qiong Li, Jing Wu, Xin He Content-Based Audio Retrieval Using Perceptual Hash. Search on Bibsonomy IIH-MSP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF content-based retrieval, audio retrieval, perceptual hash
20Phillip Rogaway, John P. Steinberger Constructing Cryptographic Hash Functions from Fixed-Key Blockciphers. Search on Bibsonomy CRYPTO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF blockcipher-based hashing, collision-resistant hashing, cryptographic hash functions, compression functions, ideal-cipher model
20Andrew Brampton, Andrew MacQuire, Idris A. Rai, Nicholas J. P. Race, Laurent Mathy Stealth distributed hash table: unleashing the real potential of peer-to-peer. Search on Bibsonomy CoNEXT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF stealth DHT, peer-to-peer, distributed hash tables
20Vebjørn Moen, Håvard Raddum, Kjell Jørgen Hole Weaknesses in the temporal key hash of WPA. Search on Bibsonomy ACM SIGMOBILE Mob. Comput. Commun. Rev. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF MIC, Michael, temporal key hash, 802.11, WPA, TKIP
20Sung-Woon Lee, Hyun-Sung Kim 0001, Kee-Young Yoo Cryptanalysis of a user authentication scheme using hash functions. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF authentication, cryptography, hash function, password, guessing attack
20Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo A secure user authentication scheme using hash functions. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF security, authentication, cryptography, hash function, password
20Anwitaman Datta, Sarunas Girdzijauskas, Karl Aberer On de Bruijn Routing in Distributed Hash Tables: There and Back Again. Search on Bibsonomy Peer-to-Peer Computing The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Storage Load Balancing, Routing, Distributed Hash Tables, de Bruijn networks
20Reihaneh Safavi-Naini, Huaxiong Wang New constructions for multicast re-keying schemes using perfect hash families. Search on Bibsonomy CCS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF perfect hash family, broadcast encryption, secure multicasting
20Paolino Di Felice, Ugo Madama Reducing the Storage Requirements of a Perfect Hash Function. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF array packing, memory requirements, Perfect hash function
20Sanjiv K. Bhatia, Chaman L. Sabharwal Near perfect hash table for image databases. Search on Bibsonomy SAC The full citation details ... 1996 DBLP  DOI  BibTeX  RDF image database indexing, hash table, 2D string
20Ming-Syan Chen, Ming-Ling Lo, Philip S. Yu, Honesty C. Young Applying Segmented Right-Deep Trees to Pipelining Multiple Hash Joins. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 1995 DBLP  DOI  BibTeX  RDF bushy trees, right-deep trees, Pipelining, parallel query processing, hash joins
20Chaman L. Sabharwal, Sanjiv K. Bhatia A perfect hash function for image database indexing. Search on Bibsonomy SAC The full citation details ... 1994 DBLP  DOI  BibTeX  RDF image databases, perfect hash functions, 2D strings
20Miklós Ajtai, Noga Alon, Jehoshua Bruck, Robert Cypher, Ching-Tien Ho, Moni Naor, Endre Szemerédi Fault Tolerant Graphs, Perfect Hash Functions and Disjoint Paths Search on Bibsonomy FOCS The full citation details ... 1992 DBLP  DOI  BibTeX  RDF k-fault tolerant graph, performance degradation, disjoint paths, perfect hash functions
20Alan Siegel On Universal Classes of Fast High Performance Hash Functions, Their Time-Space Tradeoff, and Their Applications (Extended Abstract) Search on Bibsonomy FOCS The full citation details ... 1989 DBLP  DOI  BibTeX  RDF multiplicative penalty, universal classes, probabilistic argument, random words, explicit algorithm, double hashing, universal functions, T-time PRAM algorithm, lower bound, hash functions, Omega network, time-space tradeoff
20John G. Cleary Compact Hash Tables Using Bidirectional Linear Probing. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 1984 DBLP  DOI  BibTeX  RDF searchfing, bidirectional linear probing, hash storage, memory compaction, open addressing, information retrieval, performance analysis, scatter storage, Address calculation
20Norbert Tihanyi, Tamás Bisztray, Bertalan Borsos, Sebastien Raveau Privacy-Preserving Password Cracking: How a Third Party Can Crack Our Password Hash Without Learning the Hash Value or the Cleartext. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
20Norbert Tihanyi, Tamás Bisztray, Bertalan Borsos, Sebastien Raveau Privacy-Preserving Password Cracking: How a Third Party Can Crack Our Password Hash Without Learning the Hash Value or the Cleartext. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Itay Bookstein, Boaz Tsaban TS-Hash: a lightweight cryptographic hash family based on Galois LFSRs. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
20Vincent Cheval, Cas Cremers, Alexander Dax, Lucca Hirschi, Charlie Jacomme, Steve Kremer Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2023 DBLP  BibTeX  RDF
20Shlomi Dolev, Avraam Yagudaev, Moti Yung HBSS: (Simple) Hash-Based Stateless Signatures - Hash All the Way to the Rescue! - (Preliminary Version). Search on Bibsonomy CSCML The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Xiaohan Sun, Jiting Zhou Deep Perceptual Hash Based on Hash Center for Image Copyright Protection. Search on Bibsonomy IEEE Access The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Darshana Upadhyay, Nupur Gaikwad, Marzia Zaman, Srinivas Sampalli Investigating the Avalanche Effect of Various Cryptographically Secure Hash Functions and Hash-Based Applications. Search on Bibsonomy IEEE Access The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Abdelrahman AlMahmoud, Ernesto Damiani, Hadi Otrok Hash-Comb: A Hierarchical Distance-Preserving Multi-Hash Data Representation for Collaborative Analytics. Search on Bibsonomy IEEE Access The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20William Kuszmaul A Hash Table Without Hash Functions, and How to Get the Most Out of Your Random Bits. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Vincent Cheval, Cas Cremers, Alexander Dax, Lucca Hirschi, Charlie Jacomme, Steve Kremer Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
20Mayuresh Sunil Pardeshi, Ruey-Kai Sheu, Shyan-Ming Yuan Hash-Chain Fog/Edge: A Mode-Based Hash-Chain for Secured Mutual Authentication Protocol Using Zero-Knowledge Proofs in Fog/Edge. Search on Bibsonomy Sensors The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Chen Zhong, Prajwal Challa, Xingsheng Zhao, Song Jiang 0001 Buffered Hash Table: Leveraging DRAM to Enhance Hash Indexes in the Persistent Memory. Search on Bibsonomy NVMSA The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20William Kuszmaul A Hash Table Without Hash Functions, and How to Get the Most Out of Your Random Bits. Search on Bibsonomy FOCS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Yaofeng Chen, Chunyang Zhang, Long Ye, Xiaogang Peng, Meikang Qiu, Weipeng Cao W-Hash: A Novel Word Hash Clustering Algorithm for Large-Scale Chinese Short Text Analysis. Search on Bibsonomy KSEM (3) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Peter Stolz, Sebastian Roth, Ben Stock To hash or not to hash: A security assessment of CSP's unsafe-hashes expression. Search on Bibsonomy SP (Workshops) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Dmitrii I. Koshelev How to hash onto 픾2 and not to hash onto 픾1 for pairing-friendly curves. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2021 DBLP  BibTeX  RDF
20Xu An Wang 0001, Yunxuan Su, Jindan Zhang Cryptanalysis of Double-trapdoor Hash Function and Multi-Trapdoor Hash Function Schemes. Search on Bibsonomy NaNA The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
20Haiting Zhu, Junmei Wan, Nan Li, Yingying Deng, Gaofeng He, Jing Guo, Lu Zhang Odd-Even Hash Algorithm: A Improvement of Cuckoo Hash Algorithm. Search on Bibsonomy CBD The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
20Yann Connan 0001 Contribution à la cryptographie post-quantique basée sur les codes correcteurs d'erreurs en métrique rang : Hash Proof Systems et cryptographie à bas coût. (Contribution to post-quantum code-based cryptography in rank metric : Hash Proof Systems and lightweight cryptography). Search on Bibsonomy 2021   RDF
20Lkhagvadorj Battulga, Sang-Hyun Lee, Aziz Nasridinov, Kwan-Hee Yoo Hash-tree PCA: accelerating PCA with hash-based grouping. Search on Bibsonomy J. Supercomput. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
20Xing Wei, Huiqi Hu, Xuan Zhou 0001, Aoying Zhou A Chunk-Based Hash Table Caching Method for In-Memory Hash Joins. Search on Bibsonomy WISE (2) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
20Pawel Czarnul, Grzegorz Golaszewski, Grzegorz Jereczek, Maciej Maciejewski Development and benchmarking a parallel Data AcQuisition framework using MPI with hash and hash+tree structures in a cluster environment. Search on Bibsonomy ISPDC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
20Gang Liu, Peng Wang 0009, Rong Wei, Dingfeng Ye Revisiting Construction of Online Cipher in Hash-ECB-Hash Structure. Search on Bibsonomy Inscrypt The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
20Norbert Tihanyi, Bertalan Borsos The Theory and Practice of Magic Hash Based Attacks on Lightweight Cryptographic Hash Functions in Complex IoT Environments. Search on Bibsonomy SpaCCS Workshops The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
20Rui Zong, Xiaoyang Dong, Xiaoyun Wang 0001 Collision Attacks on Round-Reduced Gimli-Hash/Ascon-Xof/Ascon-Hash. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2019 DBLP  BibTeX  RDF
20Martin Dietzfelbinger, Jörg Keller 0001 Determining Minimum Hash Width for Hash Chains. Search on Bibsonomy CECC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
20Jie Jiang 0008, Yibo Yan, Mengyu Zhang, Binchao Yin, Yumeng Jiang, Tong Yang 0003, Xiaoming Li 0001, Tengjiao Wang Shifting Hash Table: An Efficient Hash Table with Delicate Summary. Search on Bibsonomy GLOBECOM Workshops The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
20Mehran Mozaffari Kermani, Reza Azarderakhsh, Ausmita Sarker, Amir Jalali Efficient and Reliable Error Detection Architectures of Hash-Counter-Hash Tweakable Enciphering Schemes. Search on Bibsonomy ACM Trans. Embed. Comput. Syst. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
20Shupeng Su, Chao Zhang 0001, Kai Han 0002, Yonghong Tian Greedy Hash: Towards Fast Optimization for Accurate Hash Coding in CNN. Search on Bibsonomy NeurIPS The full citation details ... 2018 DBLP  BibTeX  RDF
20Yuichi Kaji, Jason Paul Cruz, Yoshio Yatani Hash-Based Signature with Constant-Sum Fingerprinting and Partial Construction of Hash Chains. Search on Bibsonomy ICETE (2) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
20Nicolas Le Scouarnec Cuckoo++ hash tables: high-performance hash tables for networking applications. Search on Bibsonomy ANCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
20Nicolas Le Scouarnec Cuckoo++ Hash Tables: High-Performance Hash Tables for Networking Applications. Search on Bibsonomy CoRR The full citation details ... 2017 DBLP  BibTeX  RDF
20Pornchai Assamongkol, Suphakant Phimoltares, Sasipa Panthuwadeethorn Enhancing trustworthy of document using a combination of image hash and cryptographic hash. Search on Bibsonomy JCSSE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
20Tong Yang 0003, Binchao Yin, Hang Li, Muhammad Shahzad 0001, Steve Uhlig, Bin Cm, Xiaoming Li 0001 Rectangular hash table: Bloom filter and bitmap assisted hash table with high speed. Search on Bibsonomy IEEE BigData The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
20Zachary W. Parchman, Ferrol Aderholdt, Manjunath Gorentla Venkata SharP Hash: A High-Performing Distributed Hash for Extreme-Scale Systems. Search on Bibsonomy CLUSTER The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
20Puliparambil Megha Mukundan, Sindhu Manayankath, Chungath Srinivasan, Madathil Sethumadhavan Hash-One: a lightweight cryptographic hash function. Search on Bibsonomy IET Inf. Secur. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
20Iris Anshel, Derek Atkins, Dorian Goldfeld, Paul E. Gunnells Hickory Hash(TM): Implementing an Instance of an Algebraic Eraser(TM) Hash Function on an MSP430 Microcontroller. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2016 DBLP  BibTeX  RDF
20Joseph Jupin, Justin Y. Shi, Eduard C. Dragut PSH: A probabilistic signature hash method with hash neighborhood candidate generation for fast edit-distance string comparison on big data. Search on Bibsonomy IEEE BigData The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
20Behzad Salami 0001, Oriol Arcas-Abella, Nehir Sönmez, Osman S. Unsal, Adrián Cristal Kestelman Accelerating Hash-Based Query Processing Operations on FPGAs by a Hash Table Caching Technique. Search on Bibsonomy CARLA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
20Bo-Kyeong Kim, Sang-Won Lee 0001, Dong-Ho Lee h-Hash: A Hash Index Structure for Flash-Based Solid State Drives. Search on Bibsonomy J. Circuits Syst. Comput. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
20Ashwin Jha, Mridul Nandi Some Cryptanalytic Results on Zipper Hash and Concatenated Hash. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2015 DBLP  BibTeX  RDF
20Zhelei Sun, Peng Wang 0009, Liting Zhang Weak-Key and Related-Key Analysis of Hash-Counter-Hash Tweakable Enciphering Schemes. Search on Bibsonomy ACISP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
20Mehran Mozaffari Kermani, Reza Azarderakhsh Reliable hash trees for post-quantum stateless cryptographic hash-based signatures. Search on Bibsonomy DFTS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
20Avradip Mandal, Arnab Roy 0001 Relational Hash: Probabilistic Hash for Verifying Relations, Secure Against Forgery and More. Search on Bibsonomy CRYPTO (1) The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
20Gülüzar Çit Sanal heykeltraşlıkta optimize edilmiş hash-temelli octree veri yapısının kullanılması (Using an optimized hash-based octree data structure in virtual sculpting) Search on Bibsonomy 2015   RDF
20Tahir Ahmad, Usman Younis Randomness testing of non-cryptographic hash functions for real-time hash table based storage and look-up of URLs. Search on Bibsonomy J. Netw. Comput. Appl. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
20Tyler Clemons, S. M. Faisal, Shirish Tatikonda, Charu C. Aggarwal, Srinivasan Parthasarathy 0001 One, Two, Hash! Counting Hash Tables for Flash Devices. Search on Bibsonomy CODS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
20Sebastian Bittl Efficient Construction of Infinite Length Hash Chains with Perfect Forward Secrecy Using Two Independent Hash Functions. Search on Bibsonomy SECRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
20Yevgeniy Dodis, Thomas Ristenpart, John P. Steinberger, Stefano Tessaro To Hash or Not to Hash Again? (In)differentiability Results for H2 and HMAC. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2013 DBLP  BibTeX  RDF
20Ahto Buldas, Risto Laanoja Security Proofs for Hash Tree Time-Stamping Using Hash Functions with Small Output Size. Search on Bibsonomy ACISP The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
20Tyler Clemons, S. M. Faisal, Shirish Tatikonda, Charu C. Aggarwal, Srinivasan Parthasarathy 0001 Hash in a flash: Hash tables for flash devices. Search on Bibsonomy IEEE BigData The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
20Bart Mennink Provable Security of Cryptographic Hash Functions (Bewijsbare veiligheid van cryptografische hashfuncties) ; Provable Security of Cryptographic Hash Functions. Search on Bibsonomy 2013   RDF
20João Pedro Barreto 0002, Luís Veiga, Paulo Ferreira 0001 Hash challenges: Stretching the limits of compare-by-hash in distributed data deduplication. Search on Bibsonomy Inf. Process. Lett. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
20Tyler Clemons, S. M. Faisal, Shirish Tatikonda, Charu C. Aggarwal, Srinivasan Parthasarathy 0001 Hash in a Flash: Hash Tables for Solid State Devices Search on Bibsonomy CoRR The full citation details ... 2012 DBLP  BibTeX  RDF
20Souradyuti Paul, Ekawat Homsirikamol, Kris Gaj A Novel Permutation-based Hash Mode of Operation FP and the Hash Function SAMOSA. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2012 DBLP  BibTeX  RDF
20Eleazar Jiménez Serrano On the design of special hash functions for multiple hash tables. Search on Bibsonomy CCE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
20R. Joshua Tobin, David Malone Hash pile ups: Using collisions to identify unknown hash functions. Search on Bibsonomy CRiSIS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
20Souradyuti Paul, Ekawat Homsirikamol, Kris Gaj A Novel Permutation-Based Hash Mode of Operation FP and the Hash Function SAMOSA. Search on Bibsonomy INDOCRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
20Yevgeniy Dodis, Thomas Ristenpart, John P. Steinberger, Stefano Tessaro To Hash or Not to Hash Again? (In)Differentiability Results for H 2 and HMAC. Search on Bibsonomy CRYPTO The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
20Karel Wouters Hash-Chain based Protocols for Time-Stamping and Secure Logging: Formats, Analysis and Design (Hash-keten gebaseerde protocollen voor tijdszegels en beveiligde logbestanden: formaten, analyse en ontwerp). (PDF / PS) Search on Bibsonomy 2012   RDF
20Bart Preneel MASH Hash Functions (Modular Arithmetic Secure Hash). Search on Bibsonomy Encyclopedia of Cryptography and Security (2nd Ed.) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
20 R-hash : Hash Function Using Random Quadratic Polynomials Over GF(2). Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2011 DBLP  BibTeX  RDF
20 GB-hash : Hash Functions Using Groebner Basis Search on Bibsonomy CoRR The full citation details ... 2010 DBLP  BibTeX  RDF
Displaying result #701 - #800 of 7013 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license