Hash

Results: 3740



#Item
561

Indifferentiability Characterization of Hash Functions and Optimal Bounds of Popular Domain Extensions Rishiraj Bhattacharyya1 , Avradip Mandal2 , and Mridul Nandi3 1 Applied Statistics Unit, Indian Statistical Institut

Add to Reading List

Source URL: www.isical.ac.in

Language: English - Date: 2011-12-28 03:46:39
    562File sharing / Distributed data storage / Network architecture / Peer-to-peer / Distributed hash table / Hash list / Clientserver model / Tiny Encryption Algorithm

    Push-to-Pull Peer-to-Peer Live Streaming Thomas Locher, Remo Meier, Stefan Schmid, and Roger Wattenhofer Computer Engineering and Networks Laboratory (TIK), ETH Zurich, 8092 Zurich, Switzerland {lochert,remmeier,schmiste

    Add to Reading List

    Source URL: dcg.ethz.ch

    Language: English - Date: 2014-09-26 08:36:48
    563

    Characterization of Padding Rules and Different Variants of MD Hash Functions Mridul Nandi National Institute of Standards and Technology

    Add to Reading List

    Source URL: www.isical.ac.in

    Language: English - Date: 2011-12-28 03:46:39
      564

      Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512 ¨ Leurent2 , Florian Mendel3 , Mar´ıa Praveen Gauravaram1 , Gaeten 4

      Add to Reading List

      Source URL: 2010.africacrypt.com

      Language: English - Date: 2010-05-06 01:47:12
        565

        Leftover Hash Lemma, Revisited Boaz Barak ∗ Yevgeniy Dodis†

        Add to Reading List

        Source URL: www.uclouvain.be

        Language: English - Date: 2011-12-14 05:30:42
          566Information retrieval / Hashing / Error detection and correction / Information science / Computer programming / Cryptographic hash functions / Search algorithms / Distributed data storage / Bloom filter / Hash function / Hash list / Trie

          Data Discovery and Dissemination with DIP tinyos-2.x/tos/lib/net/dip Kaisen Lin UC San Diego

          Add to Reading List

          Source URL: sing.stanford.edu

          Language: English - Date: 2014-11-10 18:30:10
          567Cryptography / Public-key cryptography / Commitment scheme / Secret sharing / Zero-knowledge proof / Cryptographic hash function / Coin flipping / Universal composability / Cryptographic primitive / One-way function / Claw-free permutation / RSA

          Very-efficient simulatable flipping of many coins into a well (and a new very-efficient extractable-and-equivocable commitment scheme) Luís T. A. N. Brandão∗ (Technical report – June 28, Abstract. Secure two

          Add to Reading List

          Source URL: eprint.iacr.org

          Language: English - Date: 2015-06-28 21:51:08
          568Distributed data storage / Tapestry / Routing / Overlay network / Pastry / Dynamic routing / Peer-to-peer / Chord / Distributed hash table / Content addressable network

          Appears in Proceedings of the 11th IEEE International Conference on Network Protocols (ICNPExploiting Routing Redundancy via Structured Peer-to-Peer Overlays Ben Y. Zhao, Ling Huang, Jeremy Stribling, Anthony D.

          Add to Reading List

          Source URL: www.cs.ucsb.edu

          Language: English - Date: 2004-07-18 15:32:23
          569Distributed data storage / Computing / Concurrent computing / Distributed computing / Distributed hash table / Kademlia / Pastry / Chord / Routing / Peer-to-peer / Overlay network / Tapestry

          Handling Churn in a DHT Sean Rhea, Dennis Geels, Timothy Roscoe, and John Kubiatowicz University of California, Berkeley and Intel Research, Berkeley {srhea,geels,kubitron}@cs.berkeley.edu,

          Add to Reading List

          Source URL: www.oceanstore.org

          Language: English - Date: 2003-12-22 17:29:23
          570

          Introduction Early Applications to Block Ciphers Preimages of Hash Functions

          Add to Reading List

          Source URL: web.spms.ntu.edu.sg

          Language: English - Date: 2012-08-26 19:26:44
            UPDATE