Sciweavers

4 search results - page 1 / 1
» MDx-MAC and Building Fast MACs from Hash Functions
Sort
View
CRYPTO
1995
Springer
118views Cryptology» more  CRYPTO 1995»
13 years 11 months ago
MDx-MAC and Building Fast MACs from Hash Functions
Bart Preneel, Paul C. van Oorschot
FSE
2008
Springer
166views Cryptology» more  FSE 2008»
13 years 9 months ago
Accelerating the Whirlpool Hash Function Using Parallel Table Lookup and Fast Cyclical Permutation
Hash functions are an important building block in almost all security applications. In the past few years, there have been major advances in the cryptanalysis of hash functions, es...
Yedidya Hilewitz, Yiqun Lisa Yin, Ruby B. Lee
CRYPTO
2012
Springer
237views Cryptology» more  CRYPTO 2012»
11 years 10 months ago
Tweakable Blockciphers with Beyond Birthday-Bound Security
Liskov, Rivest and Wagner formalized the tweakable blockcipher (TBC) primitive at CRYPTO’02. The typical recipe for instantiating a TBC is to start with a blockcipher, and then b...
Will Landecker, Thomas Shrimpton, R. Seth Terashim...
EDBT
2009
ACM
277views Database» more  EDBT 2009»
14 years 3 days ago
G-hash: towards fast kernel-based similarity search in large graph databases
Structured data including sets, sequences, trees and graphs, pose significant challenges to fundamental aspects of data management such as efficient storage, indexing, and simila...
Xiaohong Wang, Aaron M. Smalter, Jun Huan, Gerald ...