|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 3717 occurrences of 1502 keywords
|
|
|
Results
Found 7025 publication records. Showing 7013 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
20 | Peter Brass |
Universal hash functions for an infinite universe and hash trees. |
Inf. Process. Lett. |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Dhananjoy Dey, Prasanna Raghaw Mishra, Indranath Sen Gupta |
HF-hash : Hash Functions Using Restricted HFE Challenge-1 |
CoRR |
2009 |
DBLP BibTeX RDF |
|
20 | A. T. Akinwale, F. T. Ibharalu |
The Usefulness of Multilevel Hash Tables with Multiple Hash Functions in Large Databases |
CoRR |
2009 |
DBLP BibTeX RDF |
|
20 | Giacomo de Meulenaer, Christophe Petit 0001, Jean-Jacques Quisquater |
Hardware Implementations of a Variant of the Zémor-Tillich Hash Function: Can a Provably Secure Hash Function be very efficient ? |
IACR Cryptol. ePrint Arch. |
2009 |
DBLP BibTeX RDF |
|
20 | Sebastiaan Indesteege, Bart Preneel |
Coding Theory and Hash Function Design - A Case Study: The Lane Hash Function. |
Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Sheena Mathew, K. Poulose Jacob |
JERIM-320: A new 320-Bit Hash Function Compared to Hash Functions with Parallel Branches. |
Int. J. Comput. Sci. Appl. |
2008 |
DBLP BibTeX RDF |
|
20 | Mridul Nandi |
Improving upon HCTR and matching attacks for Hash-Counter-Hash approach. |
IACR Cryptol. ePrint Arch. |
2008 |
DBLP BibTeX RDF |
|
20 | Jonathan J. Hoch, Adi Shamir |
On the Strength of the Concatenated Hash Combiner when All the Hash Functions are Weak. |
IACR Cryptol. ePrint Arch. |
2008 |
DBLP BibTeX RDF |
|
20 | Debrup Chakraborty, Palash Sarkar 0001 |
HCH: A New Tweakable Enciphering Scheme Using the Hash-Counter-Hash Approach. |
IACR Cryptol. ePrint Arch. |
2007 |
DBLP BibTeX RDF |
|
20 | Olaf Landsiedel, Tobias Heer, Klaus Wehrle |
MHT: Eine mobilitätsbewusste verteilte Hash-Tabelle (MHT: A Mobility-aware Distributed Hash Table). |
it Inf. Technol. |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Bart Preneel |
Mash Hash Functions (Modular Arithmetic Secure Hash). |
Encyclopedia of Cryptography and Security |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Duo Lei |
F-HASH: Securing Hash Functions Using Feistel Chaining. |
IACR Cryptol. ePrint Arch. |
2005 |
DBLP BibTeX RDF |
|
20 | Harris E. Michail, Athanasios P. Kakarountas, Athanasios Milidonis, Costas E. Goutis |
Efficient implementation of the keyed-hash message authentication code (HMAC) using the SHA-1 hash function. |
ICECS |
2004 |
DBLP DOI BibTeX RDF |
|
20 | Türker Özsari |
A Hash of Hash Functions |
CoRR |
2003 |
DBLP BibTeX RDF |
|
20 | Guy M. Lohman |
Review - Hash Joins and Hash Teams in Microsoft SQL Server. |
ACM SIGMOD Digit. Rev. |
2000 |
DBLP BibTeX RDF |
|
20 | Alfons Kemper |
Review - Hash Joins and Hash Teams in Microsoft SQL Server. |
ACM SIGMOD Digit. Rev. |
1999 |
DBLP BibTeX RDF |
|
20 | Luc Devroye |
The Height and Size of Random Hash Trees and Random Pebbled Hash Trees. |
SIAM J. Comput. |
1999 |
DBLP DOI BibTeX RDF |
|
20 | Goetz Graefe, Ross Bunker, Shaun Cooper |
Hash Joins and Hash Teams in Microsoft SQL Server. |
VLDB |
1998 |
DBLP BibTeX RDF |
|
20 | Evan P. Harris, Kotagiri Ramamohanarao |
Using Optimized Multi-Attribute Hash Indexes for Hash Joins. |
Australasian Database Conference |
1994 |
DBLP BibTeX RDF |
|
20 | James K. Mullin |
Hash Functions for Hash-based Join Methods. |
Comput. J. |
1992 |
DBLP BibTeX RDF |
|
20 | Masaru Kitsuregawa, Yasushi Ogawa |
Bucket Spreading Parallel Hash: A New, Robust, Parallel Hash Join Method for Data Skew in the Super Database Computer (SDC). |
VLDB |
1990 |
DBLP BibTeX RDF |
|
20 | Wei-Pang Yang, M. W. Du |
A Dynamic Perfect Hash Function Defined by an Extended Hash Indicator Table. |
VLDB |
1984 |
DBLP BibTeX RDF |
|
16 | Rui Zhou 0001, Chengfei Liu, Jianxin Li 0001 |
Fast ELCA computation for keyword queries on XML data. |
EDBT |
2010 |
DBLP DOI BibTeX RDF |
|
16 | Jooyoung Lee 0001, Daesung Kwon |
Tree-based key predistribution for wireless sensor networks. |
Wirel. Networks |
2009 |
DBLP DOI BibTeX RDF |
Wireless sensor network, Tree structure, Key predistribution |
16 | Atilla Elçi, Behnam Rahnama |
AWGN based seed for random noise generator in ParseKey+. |
SIN |
2009 |
DBLP DOI BibTeX RDF |
imperfect use of timestamp, parsekey+, side channel attack, awgn |
16 | Martin Dietzfelbinger, Stefan Edelkamp |
Perfect Hashing for State Spaces in BDD Representation. |
KI |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Florian Mendel, Tomislav Nad, Martin Schläffer |
Collision Attack on Boole. |
ACNS |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Beata Sarna-Starosta, Tom Schrijvers |
Attributed Data for CHR Indexing. |
ICLP |
2009 |
DBLP DOI BibTeX RDF |
term representation, attributed variables, indexing, program transformation, Constraint Handling Rules |
16 | Jean-Philippe Aumasson, Çagdas Çalik, Willi Meier, Onur Özen, Raphael C.-W. Phan, Kerem Varici |
Improved Cryptanalysis of Skein. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Ahto Buldas, Aivo Jürgenson, Margus Niitsoo |
Efficiency Bounds for Adversary Constructions in Black-Box Reductions. |
ACISP |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Jiang Wu 0001, Douglas R. Stinson |
A Highly Scalable RFID Authentication Protocol. |
ACISP |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Onur Özen, Martijn Stam |
Another Glance at Double-Length Hashing. |
IMACC |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Giovanni Di Crescenzo, Shaoquan Jiang, Reihaneh Safavi-Naini |
Corruption-Localizing Hashing. |
ESORICS |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Gaëtan Leurent, Phong Q. Nguyen |
How Risky Is the Random-Oracle Model? |
CRYPTO |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Noga Alon, Shai Gutner |
Balanced Hashing, Color Coding and Approximate Counting. |
IWPEC |
2009 |
DBLP DOI BibTeX RDF |
Approximate counting of subgraphs, derandomization, expanders, perfect hashing, color-coding, k-wise independence |
16 | Morten Skaarup Jensen, Rasmus Pagh |
Optimality in External Memory Hashing. |
Algorithmica |
2008 |
DBLP DOI BibTeX RDF |
Index, Hashing, Dictionary, External memory |
16 | Zoi Kaoudi, Iris Miliaraki, Manolis Koubarakis |
RDFS Reasoning and Query Answering on Top of DHTs. |
ISWC |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Hiroaki Hazeyama, Yoshihide Matsumoto, Youki Kadobayashi |
Design of an FDB based Intra-domain Packet Traceback System. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
Intra Domain, Forwarding Data Base, Security, IP Traceback |
16 | Viet Yen Nguyen, Theo C. Ruys |
Incremental Hashing for Spin. |
SPIN |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Maurice Herlihy, Nir Shavit, Moran Tzafrir |
Hopscotch Hashing. |
DISC |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Phillip Rogaway, John P. Steinberger |
Security/Efficiency Tradeoffs for Permutation-Based Hashing. |
EUROCRYPT |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Yu Hua 0001, Bin Xiao 0001, Dan Feng 0001, Bo Yu 0019 |
Bounded LSH for Similarity Search in Peer-to-Peer File Systems. |
ICPP |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Krzysztof Pietrzak |
Compression from Collisions, or Why CRHF Combiners Have a Long Output. |
CRYPTO |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Simon Rieche, Bui The Vinh, Klaus Wehrle |
Range queries and load balancing in a hierarchically structured P2P system. |
LCN |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Ge Nong, Sen Zhang |
Efficient Algorithms for the Inverse Sort Transform. |
IEEE Trans. Computers |
2007 |
DBLP DOI BibTeX RDF |
inverse sort transform, limit-order contexts, data compression, algorithm design, Burrows-Wheeler transform |
16 | Daniel Sánchez 0003, Luke Yen, Mark D. Hill, Karthikeyan Sankaralingam |
Implementing Signatures for Transactional Memory. |
MICRO |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Miguel Jimeno, Kenneth J. Christensen, Allen Roginsky |
A Power Management Proxy with a New Best-of-N Bloom Filter Design to Reduce False Positives. |
IPCCC |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Mathias Eitz, Lixu Gu |
Hierarchical Spatial Hashing for Real-time Collision Detection. |
Shape Modeling International |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Shijun Xiang, Hyoung-Joong Kim, Jiwu Huang |
Histogram-based image hashing scheme robust against geometric deformations. |
MM&Sec |
2007 |
DBLP DOI BibTeX RDF |
geometric deformation, robustness, histogram, gaussian filter, image hashing |
16 | Kengo Terasawa, Yuzuru Tanaka |
Spherical LSH for Approximate Nearest Neighbor Search on Unit Hypersphere. |
WADS |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Shuai Hao, Hock-Beng Lim |
Data Synchronization in Distributed and Constrained Mobile Sensor Networks. |
UIC |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Yong Ki Lee, Herwin Chan, Ingrid Verbauwhede |
Iteration Bound Analysis and Throughput Optimum Architecture of SHA-256 (384, 512) for Hardware Implementations. |
WISA |
2007 |
DBLP DOI BibTeX RDF |
SHA-256 (384,512), Iteration Bound Analysis, Throughput Optimum Architecture |
16 | Palash Sarkar 0001 |
Improving Upon the TET Mode of Operation. |
ICISC |
2007 |
DBLP DOI BibTeX RDF |
tweakable encryption, strong pseudo-random permutation, disk encryption, modes of operations |
16 | Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang |
How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature. |
CT-RSA |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Reouven Elbaz, David Champagne, Ruby B. Lee, Lionel Torres, Gilles Sassatelli, Pierre Guillemin |
TEC-Tree: A Low-Cost, Parallelizable Tree for Efficient Defense Against Memory Replay Attacks. |
CHES |
2007 |
DBLP DOI BibTeX RDF |
Memory Integrity, Physical Attacks, Tamper Evidence, Parallelizability, Confidentiality, Replay Attacks, Merkle Trees |
16 | Iftach Haitner, Omer Reingold |
A New Interactive Hashing Theorem. |
CCC |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Fong Pong, Nian-Feng Tzeng |
Storage-Efficient Architecture for Routing Tables via Prefix Transformation. |
LCN |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Chen Wang 0010, Li Xiao 0001, Yunhao Liu 0001, Pei Zheng |
DiCAS: An Efficient Distributed Caching Mechanism for P2P Systems. |
IEEE Trans. Parallel Distributed Syst. |
2006 |
DBLP DOI BibTeX RDF |
query response, distributed caching and adaptive search, Peer-to-peer, flooding, search efficiency |
16 | Yongdong Wu |
Tamper-Localization Watermarking with Systematic Error Correcting Code. |
ICIP |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Ayoub Massoudi, Frédéric Lefèbvre, Claire-Hélène Demarty, Lionel Oisel, Bertrand Chupeau |
A Video Fingerprint Based on Visual Digest and Local Fingerprints. |
ICIP |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Micah Lewis, Michael Jones |
A dead variable analysis for explicit model checking. |
PEPM |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Fabrício Benevenuto, Cristiano P. Costa, Marisa A. Vasconcelos, Virgílio A. F. Almeida, Jussara M. Almeida, Miranda Mowbray |
Impact of peer incentives on the dissemination of polluted content. |
SAC |
2006 |
DBLP DOI BibTeX RDF |
content pollution, peer incentive, peer-to-peer networks |
16 | Adam Kirsch, Michael Mitzenmacher |
Less Hashing, Same Performance: Building a Better Bloom Filter. |
ESA |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Praveen Kumar Vadnala, Anish Mathuria |
An Efficient Key Assignment Scheme for Access Control in a Hierarchy. |
ICISS |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Pierre-Malo Deniélou, James J. Leifer |
Abstraction preservation and subtyping in distributed languages. |
ICFP |
2006 |
DBLP DOI BibTeX RDF |
serialisation and distributed computation, subtyping, type theory, programming language semantics, module systems |
16 | Mikhail J. Atallah, Marina Blanton, Keith B. Frikken |
Key management for non-tree access hierarchies. |
SACMAT |
2006 |
DBLP DOI BibTeX RDF |
access hierarchy, dimension of a graph, fast key derivation |
16 | Aditi Pandit, Himanshu Gupta 0001 |
Communication-Efficient Implementation of Range-Joins in Sensor Networks. |
DASFAA |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Bin Wang, Zhiwei Li 0006, Mingjing Li, Wei-Ying Ma |
Large-Scale Duplicate Detection for Web Image Search. |
ICME |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Jeong Ok Kwon, Ik Rae Jeong, Dong Hoon Lee 0001 |
Provably-Secure Two-Round Password-Authenticated Group Key Exchange in the Standard Model. |
IWSEC |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Florian Mendel, Bart Preneel, Vincent Rijmen, Hirotaka Yoshida, Dai Watanabe |
Update on Tiger. |
INDOCRYPT |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Qiming Li, Dah-Ming Chiu, John C. S. Lui |
On the Practical and Security Issues of Batch Content Distribution Via Network Coding. |
ICNP |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Jongsung Kim, Alex Biryukov, Bart Preneel, Seokhie Hong |
On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract). |
SCN |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Sylvain Pasini, Serge Vaudenay |
An Optimal Non-interactive Message Authentication Protocol. |
CT-RSA |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Michael Backes 0001, Birgit Pfitzmann, Michael Waidner |
Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes. |
ESORICS |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Byeong-Seob You, Dong-Wook Lee, Sang Hun Eo, Jae-dong Lee, Hae-Young Bae |
Hybrid Index for Spatio-temporal OLAP Operations. |
ADVIS |
2006 |
DBLP DOI BibTeX RDF |
Aggregation R-tree, OLAP, Spatio-Temporal, Spatial Data Warehouse |
16 | Mihir Bellare |
New Proofs for NMAC and HMAC: Security without collision-resistance. |
CRYPTO |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Simon Rieche, Klaus Wehrle, Leo Petrak, Clemens Wrzodek |
Cerco: Supporting Range Queries with a Hierarchically Structured Peer-to-Peer System. |
LCN |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Daniel R. L. Brown |
Generic Groups, Collision Resistance, and ECDSA. |
Des. Codes Cryptogr. |
2005 |
DBLP DOI BibTeX RDF |
digital signatures, provable security, public key cryptography |
16 | Cédric De Roover, Christophe De Vleeschouwer, Frédéric Lefèbvre, Benoît Macq |
Robust image hashing based on radial variance of pixels. |
ICIP (3) |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Yevgeniy Dodis, Adam D. Smith |
Entropic Security and the Encryption of High Entropy Messages. |
TCC |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Martin Dietzfelbinger, Christoph Weidling |
Balanced Allocation and Dictionaries with Tightly Packed Constant Size Bins. |
ICALP |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Yasunobu Nohara, Sozo Inoue, Kensuke Baba, Hiroto Yasuura |
Quantitative evaluation of unlinkable ID matching schemes. |
WPES |
2005 |
DBLP DOI BibTeX RDF |
degree of unlinkability, k-steps ID matching, privacy, RFID security |
16 | Haojun Wang, Roger Zimmermann, Wei-Shinn Ku |
ASPEN: an adaptive spatial peer-to-peer network. |
GIS |
2005 |
DBLP DOI BibTeX RDF |
distributed spatial databases, peer-to-peer systems |
16 | Lars R. Knudsen, John Erik Mathiassen |
Preimage and Collision Attacks on MD2. |
FSE |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Sasa Rudan, Aleksandra Kovacevic, Charles A. Milligan, Veljko M. Milutinovic |
Data Assurance in a Conventional File Systems. |
HICSS |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Yusuke Doi, Shirou Wakayama, Masahiro Ishiyama, Satoshi Ozaki, Atsushi Inoue |
Kallima: A Tag-Reader Protocol for Privacy Enhanced RFID System. |
EUC Workshops |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Miao Ma |
Mitigating Denial of Service Attacks with Password Puzzles. |
ITCC (2) |
2005 |
DBLP DOI BibTeX RDF |
|
16 | José Rufino, Albano Alves, José Exposto, António Pina |
A Cluster Oriented Model for Dynamically Balanced DHTs. |
IPDPS |
2004 |
DBLP DOI BibTeX RDF |
|
16 | A. Murat Fiskiran, Ruby B. Lee |
Runtime Execution Monitoring (REM) to Detect and Prevent Malicious Code Execution. |
ICCD |
2004 |
DBLP DOI BibTeX RDF |
|
16 | Il-Sun You, Kyungsan Cho |
A Security Proxy Based Protocol for Authenticating the Mobile IPv6 Binding Updates. |
ICCSA (1) |
2004 |
DBLP DOI BibTeX RDF |
Mipv6 Binding Update Protocol, CAM-DH, CGA |
16 | Jun Li, Minho Sung, Jun (Jim) Xu, Li (Erran) Li |
Large-Scale IP Traceback in High-Speed Internet: Practical Techniques and Theoretical Foundation. |
S&P |
2004 |
DBLP DOI BibTeX RDF |
|
16 | Changxun Wu, Randal C. Burns |
Achieving Performance Consistency in Heterogeneous Clusters. |
HPDC |
2004 |
DBLP DOI BibTeX RDF |
|
16 | Henri Gilbert, Helena Handschuh |
Security Analysis of SHA-256 and Sisters. |
Selected Areas in Cryptography |
2003 |
DBLP DOI BibTeX RDF |
|
16 | Satish Narayanasamy, Timothy Sherwood, Suleyman Sair, Brad Calder, George Varghese |
Catching Accurate Profiles in Hardwar. |
HPCA |
2003 |
DBLP DOI BibTeX RDF |
|
16 | Sumit Ganguly, Minos N. Garofalakis, Rajeev Rastogi |
Processing Set Expressions over Continuous Update Streams. |
SIGMOD Conference |
2003 |
DBLP DOI BibTeX RDF |
|
16 | Kun Suk Kim, Sartaj Sahni |
IP Lookup By Binary Search On Prefix Length. |
ISCC |
2003 |
DBLP DOI BibTeX RDF |
router tables, binary search on length, dynamic programming, Packet routing, longest-prefix matching, controlled prefix expansion |
16 | Chai Wah Wu |
On the design of content-based multimedia authentication systems. |
IEEE Trans. Multim. |
2002 |
DBLP DOI BibTeX RDF |
|
16 | Veerle Desmet, Bart Goeman, Koenraad De Bosschere |
Independent Hashing as Confidence Mechanism for Value Predictors in Microprocessors. |
Euro-Par |
2002 |
DBLP DOI BibTeX RDF |
|
16 | Yevgeniy Dodis, Leonid Reyzin |
On the Power of Claw-Free Permutations. |
SCN |
2002 |
DBLP DOI BibTeX RDF |
|
16 | Charles C. Y. Lam, Guang Gong, Scott A. Vanstone |
Message Authentication Codes with Error Correcting Capabilities. |
ICICS |
2002 |
DBLP DOI BibTeX RDF |
Error Correcting Codes, Message Authentication Codes |
|
|