Sciweavers

30 search results - page 3 / 6
» Blockcipher-Based Hashing Revisited
Sort
View
DI
2006
114views more  DI 2006»
13 years 6 months ago
md5bloom: Forensic filesystem hashing revisited
Vassil Roussev, Yixin Chen, Timothy Bourg, Golden ...
PROVSEC
2010
Springer
13 years 4 months ago
Distinguishing Distributions Using Chernoff Information
Abstract. In this paper, we study the soundness amplification by repetition of cryptographic protocols. As a tool, we use the Chernoff Information. We specify the number of attempt...
Thomas Baignères, Pouyan Sepehrdad, Serge V...
IJNSEC
2008
113views more  IJNSEC 2008»
13 years 6 months ago
Multi-Designated Verifiers Signatures Revisited
Multi-Designated Verifier Signatures (MDVS) are privacy-oriented signatures that can only be verified by a set of users specified by the signer. We propose two new generic constru...
Sherman S. M. Chow
PDIS
1993
IEEE
13 years 10 months ago
Nested Loops Revisited
The research communityhas considered hash-based parallel joinalgorithmsthe algorithmsof choice for almosta decade. However, almostnone ofthe commercialparallel database systems us...
David J. DeWitt, Jeffrey F. Naughton, Joseph Burge...
PODC
2003
ACM
13 years 11 months ago
Routing networks for distributed hash tables
Routing topologies for distributed hashing in peer-to-peer networks are classified into two categories: deterministic and randomized. A general technique for constructing determi...
Gurmeet Singh Manku