Sciweavers

713 search results - page 1 / 143
» Dispersing Hash Functions
Sort
View
ICALP
2000
Springer
13 years 9 months ago
Dispersing Hash Functions
Rasmus Pagh
FSE
1993
Springer
148views Cryptology» more  FSE 1993»
13 years 10 months ago
Design Principles for Dedicated Hash Functions
Abstract. Dedicated hash functions are cryptographically secure compression functions which are designed specifically for hashing. They intend to form a practical alternative for ...
Bart Preneel
EUROCRYPT
2006
Springer
13 years 9 months ago
Herding Hash Functions and the Nostradamus Attack
In this paper, we develop a new attack on Damg
John Kelsey, Tadayoshi Kohno
GECCO
2006
Springer
146views Optimization» more  GECCO 2006»
13 years 9 months ago
The dispersion metric and the CMA evolution strategy
An algorithm independent metric is introduced that measures the dispersion of a uniform random sample drawn from the top ranked percentiles of the search space. A low dispersion f...
Monte Lunacek, Darrell Whitley
EUROCRYPT
1999
Springer
13 years 10 months ago
Software Performance of Universal Hash Functions
Abstract. This paper compares the parameters sizes and software performance of several recent constructions for universal hash functions: bucket hashing, polynomial hashing, Toepli...
Wim Nevelsteen, Bart Preneel