Sciweavers

465 search results - page 1 / 93
» Programmable Hash Functions and Their Applications
Sort
View
CRYPTO
2008
Springer
95views Cryptology» more  CRYPTO 2008»
13 years 6 months ago
Programmable Hash Functions and Their Applications
Dennis Hofheinz, Eike Kiltz
IMA
2009
Springer
124views Cryptology» more  IMA 2009»
13 years 11 months ago
Comparing with RSA
A multi-set (ms) is a set where an element can occur more than once. ms hash functions (mshfs) map mss of arbitrary cardinality to fixed-length strings. This paper introduces a ne...
Julien Cathalo, David Naccache, Jean-Jacques Quisq...
ASIACRYPT
2003
Springer
13 years 10 months ago
Incremental Multiset Hash Functions and Their Application to Memory Integrity Checking
We introduce a new cryptographic tool: multiset hash functions. Unlike standard hash functions which take strings as input, multiset hash functions operate on multisets (or sets). ...
Dwaine E. Clarke, Srinivas Devadas, Marten van Dij...
CRYPTO
1995
Springer
140views Cryptology» more  CRYPTO 1995»
13 years 8 months ago
Bucket Hashing and its Application to Fast Message Authentication
We introduce a new technique for constructing a family of universal hash functions. At its center is a simple metaphor: to hash a string x, cast each of its words into a small numb...
Phillip Rogaway
GECCO
2006
Springer
202views Optimization» more  GECCO 2006»
13 years 8 months ago
Evolving hash functions by means of genetic programming
The design of hash functions by means of evolutionary computation is a relatively new and unexplored problem. In this work, we use Genetic Programming (GP) to evolve robust and fa...
César Estébanez, Julio César ...