Sciweavers

122 search results - page 10 / 25
» Reducing the Storage Requirements of a Perfect Hash Function
Sort
View
ANCS
2009
ACM
13 years 5 months ago
Divide and discriminate: algorithm for deterministic and fast hash lookups
Exact and approximate membership lookups are among the most widely used primitives in a number of network applications. Hash tables are commonly used to implement these primitive ...
Domenico Ficara, Stefano Giordano, Sailesh Kumar, ...
CHES
2007
Springer
173views Cryptology» more  CHES 2007»
14 years 1 months ago
Collision Attacks on AES-Based MAC: Alpha-MAC
Message Authentication Code construction Alred and its AES-based instance Alpha-MAC were introduced by Daemen and Rijmen in 2005. We show that under certain assumptions about its i...
Alex Biryukov, Andrey Bogdanov, Dmitry Khovratovic...
ICIP
2007
IEEE
14 years 1 months ago
A Simplified Dual-Bitstream MPEG Video Streaming System with VCR Functionalities
Nowadays, video playback devices have only limited fastforward/backward playback and even they cannot provide backward playback. The limitation is due to the motion compensated pr...
Tak-Piu Ip, Yui-Lam Chan, Chang-Hong Fu, Wan-Chi S...
ITCC
2005
IEEE
14 years 1 months ago
A Proposal of Short Proxy Signature using Pairing
— In this paper, we propose a new pairing-based proxy signature. Most remarkable point in our proposal is that our scheme realizes short signature. More concretely, the explicit ...
Takeshi Okamoto, Atsuo Inomata, Eiji Okamoto
USENIX
2007
13 years 9 months ago
Supporting Practical Content-Addressable Caching with CZIP Compression
Content-based naming (CBN) enables content sharing across similar files by breaking files into positionindependent chunks and naming these chunks using hashes of their contents....
KyoungSoo Park, Sunghwan Ihm, Mic Bowman, Vivek S....