The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase hash function (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1982-1989 (19) 1990-1991 (16) 1992-1994 (20) 1995-1997 (24) 1998-1999 (32) 2000 (16) 2001 (21) 2002 (21) 2003 (43) 2004 (61) 2005 (87) 2006 (115) 2007 (109) 2008 (125) 2009 (127) 2010 (44) 2011 (40) 2012 (41) 2013 (36) 2014 (37) 2015 (23) 2016 (27) 2017 (32) 2018 (22) 2019 (5)
Publication types (Num. hits)
article(297) book(1) incollection(9) inproceedings(833) phdthesis(3)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1093 occurrences of 418 keywords

Results
Found 1143 publication records. Showing 1143 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
152Donghoon Chang, Kishan Chand Gupta, Mridul Nandi RC4-Hash: A New Hash Function Based on RC4. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Hash Function, Collision Attack, RC4, Preimage Attack
109Deukjo Hong, Bart Preneel, Sangjin Lee Higher Order Universal One-Way Hash Functions. Search on Bibsonomy ASIACRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Collision Resistant Hash Function (CRHF), Universal One-Way Hash Function (UOWHF), Higher Order Universal One-Way Hash Function, Hash Function
105Deukjo Hong, Jaechul Sung, Seokhie Hong, Sangjin Lee How to Construct Universal One-Way Hash Functions of Order r. Search on Bibsonomy INDOCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Collision Resistant Hash Function (CRHF), Universal One-Way Hash Function (UOWHF), Higher Order Universal One-Way Hash Function, Hash Function
99Phillip G. Bradford, Olga V. Gavrylyako Hash Chains with Diminishing Ranges for Sensors. Search on Bibsonomy ICPP Workshops The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
96Takahiro Matsuda 0002, Nuttapong Attrapadung, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function. Search on Bibsonomy ProvSec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF target collision resistant hash function, digital signature, standard model, strong unforgeability
94George Bebis, Michael Georgiopoulos, Niels da Vitoria Lobo Learning Geometric Hashing Functions for Model-Based Object Recognition. Search on Bibsonomy ICCV The full citation details ... 1995 DBLP  DOI  BibTeX  RDF geometric hashing functions, distribution of invariants, geometric hash function, elastic hash table, hash bins, statistical characteristics, neural network, learning (artificial intelligence), learning, object recognition, indexing, training, invariants, file organisation, topology preserving, self-organizing feature map, self-organising feature maps, elastic net, model-based object recognition
91Florian Mendel, Norbert Pramstaller, Christian Rechberger, Marcin Kontak, Janusz Szmidt Cryptanalysis of the GOST Hash Function. Search on Bibsonomy CRYPTO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF cryptanalysis, hash function, collision attack, preimage attack, second preimage attack
85Sang-Uk Shin, Kyung Hyune Rhee, DaeHyun Ryu, Sangjin Lee A New Hash Function Based on MDx-Family and Its Application to MAC. Search on Bibsonomy Public Key Cryptography The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
84Florian Mendel, Norbert Pramstaller, Christian Rechberger A (Second) Preimage Attack on the GOST Hash Function. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF cryptanalysis, hash functions, preimage attack
83James Aspnes, Muli Safra, Yitong Yin Ranged hash functions and the price of churn. Search on Bibsonomy SODA The full citation details ... 2008 DBLP  BibTeX  RDF
79Donghoon Chang, Wonil Lee, Seokhie Hong, Jaechul Sung, Sangjin Lee, Soo Hak Sung Impossibility of Construction of OWHF and UOWHF from PGV Model Based on Block Cipher Secure Against ACPCA. Search on Bibsonomy INDOCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
75Xuejia Lai, James L. Massey Hash Function Based on Block Ciphers. Search on Bibsonomy EUROCRYPT The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
74Burton S. Kaliski Jr. On Hash Function Firewalls in Signature Schemes. Search on Bibsonomy CT-RSA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
74Ahto Buldas, Sven Laur Do Broken Hash Functions Affect the Security of Time-Stamping Schemes? Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
70Ivan Damgård, Lars R. Knudsen The Breaking of the AR Hash Function. Search on Bibsonomy EUROCRYPT The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
68Michael Mitzenmacher, Salil P. Vadhan Why simple hash functions work: exploiting the entropy in a data stream. Search on Bibsonomy SODA The full citation details ... 2008 DBLP  BibTeX  RDF
68Wenbin Luo, Gregory L. Heileman Exponential Hashing in Finite Fields. Search on Bibsonomy EUC (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
68Deukjo Hong, Donghoon Chang, Jaechul Sung, Sangjin Lee, Seokhie Hong, Jaesang Lee 0002, Dukjae Moon, Sungtaek Chee A New Dedicated 256-Bit Hash Function: FORK-256. Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF 256-bit Hash Function, FORK-256
65Ahto Buldas, Aivo Jürgenson Does Secure Time-Stamping Imply Collision-Free Hash Functions? Search on Bibsonomy ProvSec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
65Jonathan J. Hoch, Adi Shamir Breaking the ICE - Finding Multicollisions in Iterated Concatenated and Expanded (ICE) Hash Functions. Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF iterated hash functions, tree based hash functions, multicollisions, cryptanalysis, Hash functions
65Ilya Mironov Collision-Resistant No More: Hash-and-Sign Paradigm Revisited. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF TCR, UOWHF, Cramer-Shoup, PSS-RSA, signatures, DSA, collision-resistance
64Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu 0001 Enhanced Target Collision Resistant Hash Functions Revisited. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF TCR, eTCR, Hash Functions, CR, Domain Extension
62Donghoon Chang, Mridul Nandi Improved Indifferentiability Security Analysis of chopMD Hash Function. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
62Hans Vandierendonck, Koenraad De Bosschere XOR-Based Hash Functions. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2005 DBLP  DOI  BibTeX  RDF XOR-based hash function, conflict-free mapping, column space, skewed-associative cache, interbank dispersion, null space
62Rina Panigrahy Entropy based nearest neighbor search in high dimensions. Search on Bibsonomy SODA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
61Dimitris A. Karras, Vasilios Zorkadis A Novel Suite of Tests for Evaluating One-Way Hash Functions for Electronic Commerce Applications. Search on Bibsonomy EUROMICRO The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Cryptographic Mechanisms, One-way Hash Function Quality, Neural Networks, Authentication, Data Integrity, Electronic Commerce, Digital Signature, Security Protocols, Multilayer Perceptrons
60Bok-Min Goi, M. U. Siddiqi, Hean-Teik Chuah Incremental Hash Function Based on Pair Chaining & Modular Arithmetic Combining. Search on Bibsonomy INDOCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Incremental Cryptography, Cryptography, Hash Function
60YoungGyo Lee, In-Jung Kim, Seungjoo Kim, Dongho Won A Method for Detecting the Exposure of OCSP Responder's Session Private Key in D-OCSP-KIS. Search on Bibsonomy EuroPKI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF D-OCSP, D-OCSP-KIS, OCSP Responder, hash function
59Kan Yasuda How to Fill Up Merkle-Damgård Hash Functions. Search on Bibsonomy ASIACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Merkle-Damgård, second-preimage resistance, one-wayness, hash function, padding
59Norbert Pramstaller, Christian Rechberger, Vincent Rijmen A compact FPGA implementation of the hash function whirlpool. Search on Bibsonomy FPGA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF compact hardware implementation, FPGA, hash function, whirlpool
58Shlomi Dolev, Limor Lahiani, Yinnon A. Haviv Brief Announcement: Unique Permutation Hashing. Search on Bibsonomy SSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
58Christian Henke, Carsten Schmoll, Tanja Zseby Empirical evaluation of hash functions for multipoint measurements. Search on Bibsonomy Computer Communication Review The full citation details ... 2008 DBLP  DOI  BibTeX  RDF multipoint measurements, packet selection, sampling, hash function, network measurement
57Florian Mendel, Vincent Rijmen Cryptanalysis of the Tiger Hash Function. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF pseudo-collision, pseudo-near-collision, Cryptanalysis, hash functions, collision, differential attack, near-collision
57Mihir Bellare, Tadayoshi Kohno Hash Function Balance and Its Impact on Birthday Attacks. Search on Bibsonomy EUROCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
56Alex Biryukov, Joseph Lano, Bart Preneel Cryptanalysis of the Alleged SecurID Hash Function. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Alleged SecurID Hash Function, Internal Collision, Vanishing Differential, Differential Cryptanalysis
56Florian Mendel, Norbert Pramstaller, Christian Rechberger Improved Collision Attack on the Hash Function Proposed at PKC'98. Search on Bibsonomy ICISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF cryptanalysis, hash functions, collision, collision attack, differential attack, near-collision
55Stefan Lucks A Failure-Friendly Design Principle for Hash Functions. Search on Bibsonomy ASIACRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF multi-collision, failure- friendliness, hash function, provable security
54Shuang Wu, Dengguo Feng, Wenling Wu Cryptanalysis of the LANE Hash Function. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF rebound attack, LANE, hash function, collision attack, SHA-3 candidates
54Máire McLoone, Ciaran McIvor High-speed & Low Area Hardware Architectures of the Whirlpool Hash Function. Search on Bibsonomy VLSI Signal Processing The full citation details ... 2007 DBLP  DOI  BibTeX  RDF hash function implementation, cryptography, whirlpool
54Kimmo Halunen, Pauli Rikula, Juha Röning On the Security of VSH in Password Schemes. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF VSH, hash function, preimage attack, password security
54Mihir Bellare, Ran Canetti, Hugo Krawczyk Keying Hash Functions for Message Authentication. Search on Bibsonomy CRYPTO The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
53Florian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen On the Collision Resistance of RIPEMD-160. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF RIPEMD-160, low-weight codewords, cryptanalysis, hash function, collision attack, differential attack
53Barzan Mozafari, Mohammad Hasan Savoji A new collision resistant hash function based on optimum dimensionality reduction using Walsh-Hadamard transform. Search on Bibsonomy ICIT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
53Walter Hohl, Xuejia Lai, Thomas Meier 0001, Christian Waldvogel Security of Iterated Hash Functions Based on Block Ciphers. Search on Bibsonomy CRYPTO The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
53William E. Burr Cryptographic Hash Standards: Where Do We Go from Here? Search on Bibsonomy IEEE Security & Privacy The full citation details ... 2006 DBLP  DOI  BibTeX  RDF hash function attack, cryptography, hash function, SHA-1, NIST
53Moses Liskov Constructing an Ideal Hash Function from Weak Ideal Compression Functions. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Merkle-Damgård, ideal primitives, non-streamable hash functions, zipper hash, Hash function, compression function
52John Kelsey, Stefan Lucks Collisions and Near-Collisions for Reduced-Round Tiger. Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF hash function, attack, collisions, Tiger
52Michael Gorski, Stefan Lucks, Thomas Peyrin Slide Attacks on a Class of Hash Functions. Search on Bibsonomy ASIACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Grindahl, RadioGatún, sponge function, MAC, hash function, slide attacks
52Anna Östlin, Rasmus Pagh Uniform hashing in constant time and linear space. Search on Bibsonomy STOC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF uniform hashing, data structures, hash function
51Miodrag J. Mihaljevic, Yuliang Zheng, Hideki Imai A Cellular Automaton Based Fast One-Way Hash Function Suitable for Hardware Implementation. Search on Bibsonomy Public Key Cryptography The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
51Chris Huntley, Galina Antonova, Paul Guinand Effect of Hash Collisions on the Performance of LAN Switching Devices and Networks. Search on Bibsonomy LCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
51George Bebis, Michael Georgiopoulos, Niels da Vitoria Lobo Using self-organizing maps to learn geometric hash functions for model-based object recognition. Search on Bibsonomy IEEE Trans. Neural Networks The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
51Shoji Miyaguchi, Kazuo Ohta, Masahiko Iwata Confirmation that Some Hash Functions Are Not Collision Free. Search on Bibsonomy EUROCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
51Muhamamd Shahazad Mughal, M. Nawaz, Farhan Ahmad, Saadia Shahzad, A. K. Bhatti, S. Mohsin A 3D-Hash Function for Fast Image Indexing and Retrieval. Search on Bibsonomy CGIV The full citation details ... 2007 DBLP  DOI  BibTeX  RDF 3D hash function, image retrieval, perfect hashing function, Image database systems, 2D string
50Anja Lehmann, Stefano Tessaro A Modular Design for Hash Functions: Towards Making the Mix-Compress-Mix Approach Practical. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
50Ye Xia 0001, Shigang Chen, Vivekanand Korgaonkar Load Balancing with Multiple Hash Functions in Peer-to-Peer Networks. Search on Bibsonomy ICPADS (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
50Pinakpani Pal, Palash Sarkar 0001 PARSHA-256- - A New Parallelizable Hash Function and a Multithreaded Implementation. Search on Bibsonomy FSE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF parallel algorithm, hash function, binary tree, SHA-256
50Zheng Gong, Xuejia Lai, Kefei Chen A synthetic indifferentiability analysis of some block-cipher-based hash functions. Search on Bibsonomy Des. Codes Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF AMS Classifications 68W40, 68Q25
49Florian Mendel, Christian Rechberger, Martin Schläffer, Søren S. Thomsen The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Grøstl, Maelstrom, hash function, collision attack, Whirlpool, near-collision
48Marc Fischlin Fast Verification of Hash Chains. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Hash tree, Hash function, Certificate, hash chain
48Phillip Rogaway, Thomas Shrimpton Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance. Search on Bibsonomy FSE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF preimage resistance, second-preimage resistance, provable security, cryptographic hash functions, collision resistance
48Jesang Lee, Seokhie Hong, Jaechul Sung, Haeryong Park A New Double-Block-Length Hash Function Using Feistel Structure. Search on Bibsonomy ISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Block Ciphers, Hash Function, Double Block Length Hash Function
47Mridul Nandi Characterizing Padding Rules of MD Hash Functions Preserving Collision Security. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF MD hash function, padding rule, suffix-free, collision resistant
47Yong Zhang, Xiamu Niu, Juncao Li, Chun-ming Li Research on a Novel Hashing Stream Cipher. Search on Bibsonomy CIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Stream cipher, Information security, Hash function
47Palash Sarkar 0001, Paul J. Schellenberg A Parallel Algorithm for Extending Cryptographic Hash Functions. Search on Bibsonomy INDOCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Merkle-Damgard construction, parallel algorithm, cryptographic hash function, collision resistance
47Przemyslaw Rodwald, Janusz Stoklosa Family of Parameterized Hash Algorithms. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
47Lars R. Knudsen, Bart Preneel Hash Functions Based on Block Ciphers and Quaternary Codes. Search on Bibsonomy ASIACRYPT The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
47Pin Lin, Wenling Wu, Chuankun Wu, Tian Qiu Analysis of Zipper as a Hash Function. Search on Bibsonomy ISPEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Hash Function, Compression Function, Zipper
47Pierre-Alain Fouque, Gaëtan Leurent Cryptanalysis of a Hash Function Based on Quasi-cyclic Codes. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF cryptanalysis, hash function, provable security, syndrome decoding, quasi-cyclic code
46Mridul Nandi Two New Efficient CCA-Secure Online Ciphers: MHCBC and MCBC. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF online cipher, CBC, universal hash function, random permutation
45Pengcheng Wei, Wei Zhang, Huaqian Yang, Jun Chen Combining RBF Neural Network and Chaotic Map to Construct Hash Function. Search on Bibsonomy ISNN (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
45Jean-Sébastien Coron, Yevgeniy Dodis, Cécile Malinaud, Prashant Puniya Merkle-Damgård Revisited: How to Construct a Hash Function. Search on Bibsonomy CRYPTO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
45Daewan Han, Sangwoo Park, Seongtaek Chee Cryptanalysis of the Modified Version of the Hash Function Proposed at PKC'98. Search on Bibsonomy FSE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
45Emmanuel Bresson, Benoît Chevallier-Mames, Christophe Clavier, Aline Gouget, Pascal Paillier, Thomas Peyrin How to Use Merkle-Damgård - On the Security Relations between Signature Schemes and Their Inner Hash Functions. Search on Bibsonomy ProvSec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
45Peter C. Dillinger, Panagiotis Manolios Fast and Accurate Bitstate Verification for SPIN. Search on Bibsonomy SPIN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
45Alfredo De Santis, Moti Yung On the Design of Provably Secure Cryptographic Hash Functions. Search on Bibsonomy EUROCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
44Marc Girault Hash-Functions Using Modulo-N Operations. Search on Bibsonomy EUROCRYPT The full citation details ... 1987 DBLP  DOI  BibTeX  RDF
44Olivier Billet, Matthew J. B. Robshaw, Yannick Seurin, Yiqun Lisa Yin Looking Back at a New Hash Function. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
44Lars R. Knudsen SMASH - A Cryptographic Hash Function. Search on Bibsonomy FSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
44Václav Skala, Martin Kuchar The Hash Function and the Principle of Duality. Search on Bibsonomy Computer Graphics International The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
44Rasmus Pagh, Zhewei Wei, Ke Yi, Qin Zhang 0001 Cache-oblivious hashing. Search on Bibsonomy PODS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF hashing, cache-oblivious algorithms
44Bo Yang 0010, Ramesh Karri, David A. McGrew A High-Speed Hardware Architecture for Universal Message Authentication Code. Search on Bibsonomy IEEE Journal on Selected Areas in Communications The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
44Baris Coskun, Bülent Sankur, Nasir D. Memon Spatio-Temporal Transform Based Video Hashing. Search on Bibsonomy IEEE Trans. Multimedia The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
44John Kelsey, Tadayoshi Kohno Herding Hash Functions and the Nostradamus Attack. Search on Bibsonomy EUROCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
44Wonil Lee, Mridul Nandi, Palash Sarkar 0001, Donghoon Chang, Sangjin Lee, Kouichi Sakurai Pseudorandomness of SPN-Type Transformations. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
43Kan Yasuda "Sandwich" Is Indeed Secure: How to Authenticate a Message with Just One Hashing. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Merkle-Damgård, Envelope MAC, RFC1828, MAC, Hash Function, Message Authentication Code, HMAC, Compression Function
43Mikkel Thorup String hashing for linear probing. Search on Bibsonomy SODA The full citation details ... 2009 DBLP  BibTeX  RDF
43Mario Lamberger, Florian Mendel Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Blender, DCH, Hash functions, collision attacks, preimage attacks, SHA-3
43Praveen Gauravaram, Lars R. Knudsen On Randomizing Hash Functions to Strengthen the Security of Digital Signatures. Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Davies-Meyer, RMX, Digital signatures, Hash functions
43Praveen Gauravaram, Katsuyuki Okeya Side Channel Analysis of Some Hash Based MACs: A Response to SHA-3 Requirements. Search on Bibsonomy ICICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF hash functions, side channel attacks, HMAC, Applied cryptography
43Florian Mendel, Vincent Rijmen Weaknesses in the HAS-V Compression Function. Search on Bibsonomy ICISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
43Shai Halevi, Hugo Krawczyk Strengthening Digital Signatures Via Randomized Hashing. Search on Bibsonomy CRYPTO The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
42Jean-Philippe Aumasson, Willi Meier, Raphael C.-W. Phan The Hash Function Family LAKE. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF HAIFA, Randomized hashing, Salt, Wide-pipe, Hash function
42Jean-Philippe Aumasson, Orr Dunkelman, Sebastiaan Indesteege, Bart Preneel Cryptanalysis of Dynamic SHA(2). Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Dynamic SHA, Dynamic SHA2, hash function, collision attack, SHA-3 candidate
42Elena Andreeva 0001, Charles Bouillaguet, Pierre-Alain Fouque, Jonathan J. Hoch, John Kelsey, Adi Shamir, Sébastien Zimmer Second Preimage Attacks on Dithered Hash Functions. Search on Bibsonomy EUROCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Cryptanalysis, Hash Function, Dithering
42Athanasios Kakarountas, Haralambos Michail, Athanasios Milidonis, Costas E. Goutis, George Theodoridis High-Speed FPGA Implementation of Secure Hash Algorithm for IPSec and VPN Applications. Search on Bibsonomy The Journal of Supercomputing The full citation details ... 2006 DBLP  DOI  BibTeX  RDF high-speed performance, Security, FPGA, hash function, hardware implementation
42Christina N. Michael, Xiao Su Incorporating a New Hash Function in OpenPGP and SSL/TLS. Search on Bibsonomy ITNG The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
42Haralambos Michail, Athanasios P. Kakarountas, Odysseas G. Koufopavlou, Constantinos E. Goutis A low-power and high-throughput implementation of the SHA-1 hash function. Search on Bibsonomy ISCAS (4) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
42Norbert Pramstaller, Christian Rechberger, Vincent Rijmen Breaking a New Hash Function Design Strategy Called SMASH. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF SMASH, cryptanalysis, hash functions, collision
42Yevgeniy Dodis, Thomas Ristenpart, Thomas Shrimpton Salvaging Merkle-Damgård for Practical Applications. Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 1143 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license