Sciweavers

658 search results - page 11 / 132
» The Grindahl Hash Functions
Sort
View
ASIACRYPT
2003
Springer
14 years 18 days ago
Incremental Multiset Hash Functions and Their Application to Memory Integrity Checking
We introduce a new cryptographic tool: multiset hash functions. Unlike standard hash functions which take strings as input, multiset hash functions operate on multisets (or sets). ...
Dwaine E. Clarke, Srinivas Devadas, Marten van Dij...
PODS
2010
ACM
206views Database» more  PODS 2010»
14 years 14 days ago
Cache-oblivious hashing
The hash table, especially its external memory version, is one of the most important index structures in large databases. Assuming a truly random hash function, it is known that i...
Rasmus Pagh, Zhewei Wei, Ke Yi, Qin Zhang
GECCO
2006
Springer
202views Optimization» more  GECCO 2006»
13 years 11 months ago
Evolving hash functions by means of genetic programming
The design of hash functions by means of evolutionary computation is a relatively new and unexplored problem. In this work, we use Genetic Programming (GP) to evolve robust and fa...
César Estébanez, Julio César ...
ASIACRYPT
1991
Springer
13 years 11 months ago
Collisions for Schnorr's Hash Function FFT-Hash Presented at Crypto '91
A method is described to generate collisions for the hash function FFT-Hash that
Joan Daemen, Antoon Bosselaers, René Govaer...
CHES
2008
Springer
128views Cryptology» more  CHES 2008»
13 years 9 months ago
Hash Functions and RFID Tags: Mind the Gap
Abstract. The security challenges posed by RFID-tag deployments are wellknown. In response there is a rich literature on new cryptographic protocols and an on-tag hash function is ...
Andrey Bogdanov, Gregor Leander, Christof Paar, Ax...