Sciweavers

61 search results - page 2 / 13
» Some Open Questions Related to Cuckoo Hashing
Sort
View
GI
2004
Springer
13 years 11 months ago
On the Use of Structured P2P Indexing Mechanisms in Mobile Ad-Hoc Scenarios
Abstract: Recently, Distributed Hash Tables evolved to a preferred approach for decentralized data management in widely distributed systems. Due to their crucial characteristics â€...
Tobias Heer, Heiko Niedermayer, Leo Petrak, Simon ...
CTRSA
2011
Springer
223views Cryptology» more  CTRSA 2011»
12 years 9 months ago
Expedient Non-malleability Notions for Hash Functions
Non-malleability of a cryptographic primitive is a fundamental security property which ensures some sort of independence of cryptographic values. The notion has been extensively st...
Paul Baecher, Marc Fischlin, Dominique Schröd...
CORR
2011
Springer
156views Education» more  CORR 2011»
13 years 1 months ago
Impossibility of Succinct Quantum Proofs for Collision-Freeness
We show that any quantum algorithm to decide whether a function f : [n] → [n] is a permutation or far from a permutation must make Ω n1/3 /w queries to f, even if the algorith...
Scott Aaronson
CORR
2008
Springer
114views Education» more  CORR 2008»
13 years 7 months ago
Self-Assembly of Infinite Structures
We review some recent results related to the self-assembly of infinite structures in the Tile Assembly Model. These results include impossibility results, as well as novel tile as...
Matthew J. Patitz, Scott M. Summers
IJNSEC
2008
98views more  IJNSEC 2008»
13 years 6 months ago
An Update on the Analysis and Design of NMAC and HMAC Functions
In this paper, we investigate the issues in the analysis and design of provably secure message authentication codes (MACs) Nested MAC (NMAC) and Hash based MAC (HMAC) proposed by ...
Praveen Gauravaram, Shoichi Hirose, Suganya Annadu...