Sciweavers

713 search results - page 1 / 143
» Dispersing Hash Functions
Sort
View
ICALP
2000
Springer
13 years 8 months ago
Dispersing Hash Functions
Rasmus Pagh
FSE
1993
Springer
148views Cryptology» more  FSE 1993»
13 years 9 months ago
Design Principles for Dedicated Hash Functions
Abstract. Dedicated hash functions are cryptographically secure compression functions which are designed specifically for hashing. They intend to form a practical alternative for ...
Bart Preneel
EUROCRYPT
2006
Springer
13 years 8 months ago
Herding Hash Functions and the Nostradamus Attack
In this paper, we develop a new attack on Damg
John Kelsey, Tadayoshi Kohno
GECCO
2006
Springer
146views Optimization» more  GECCO 2006»
13 years 8 months ago
The dispersion metric and the CMA evolution strategy
An algorithm independent metric is introduced that measures the dispersion of a uniform random sample drawn from the top ranked percentiles of the search space. A low dispersion f...
Monte Lunacek, Darrell Whitley
EUROCRYPT
1999
Springer
13 years 9 months ago
Software Performance of Universal Hash Functions
Abstract. This paper compares the parameters sizes and software performance of several recent constructions for universal hash functions: bucket hashing, polynomial hashing, Toepli...
Wim Nevelsteen, Bart Preneel