Sciweavers

713 search results - page 45 / 143
» Dispersing Hash Functions
Sort
View
JUCS
2008
144views more  JUCS 2008»
15 years 3 months ago
New Results on NMAC/HMAC when Instantiated with Popular Hash Functions
Abstract: Message Authentication Code (MAC) algorithms can provide cryptographically secure authentication services. One of the most popular algorithms in commercial
Christian Rechberger, Vincent Rijmen
154
Voted
SCN
2008
Springer
141views Communications» more  SCN 2008»
15 years 3 months ago
Improved Privacy of the Tree-Based Hash Protocols Using Physically Unclonable Function
In 2004, Molnar and Wagner introduced a very appealing scheme dedicated to the identification of RFID tags. Their protocol relies on a binary tree of secrets which are shared
Julien Bringer, Hervé Chabanne, Thomas Icar...
97
Voted
TKDE
1998
63views more  TKDE 1998»
15 years 3 months ago
Reducing the Storage Requirements of a Perfect Hash Function
Paolino Di Felice, Ugo Madama
125
Voted
FPGA
2009
ACM
260views FPGA» more  FPGA 2009»
15 years 1 months ago
Fast and scalable packet classification using perfect hash functions
Viktor Pus, Jan Korenek