Sciweavers

17 search results - page 1 / 4
» Small Size Hashes with Enhanced Security
Sort
View
IJNSEC
2006
81views more  IJNSEC 2006»
13 years 10 months ago
Small Size Hashes with Enhanced Security
This paper contains techniques for enhancing the strength of any cryptographic hash function. For an "ideal", traditional hash function with an m-bit result, the complex...
Lars R. Knudsen
ESA
2008
Springer
129views Algorithms» more  ESA 2008»
14 years 16 days ago
More Robust Hashing: Cuckoo Hashing with a Stash
Cuckoo hashing holds great potential as a high-performance hashing scheme for real applications. Up to this point, the greatest drawback of cuckoo hashing appears to be that there...
Adam Kirsch, Michael Mitzenmacher, Udi Wieder
JDCTA
2008
88views more  JDCTA 2008»
13 years 10 months ago
A Key Distribution method for Reducing Storage and Supporting High Level Security in the Large-scale WSN
In WSNs, since the attacks, such as jamming or eavesdropping without physical access, easily occur, security is one of the important requirements for WSNs. The key pre-distributio...
Yoon-Su Jeong, Yong-Tae Kim, Gil-Cheol Park, Sang ...
ICSAP
2010
13 years 8 months ago
Enhanced Cost Effective Symmetric Key Algorithm for Small Amount of Data
Security being the major concern during data transfers, we have various challenges to face. The requirements of the security model vary depending on the type of data to be encrypte...
R. Satheesh Kumar, E. Pradeep, K. Naveen, R. Gunas...
FSE
1997
Springer
246views Cryptology» more  FSE 1997»
14 years 2 months ago
Fast Message Authentication Using Efficient Polynomial Evaluation
Abstract. Message authentication codes (MACs) using polynomial evaluation have the advantage of requiring a very short key even for very large messages. We describe a low complexit...
Valentine Afanassiev, Christian Gehrmann, Ben J. M...