Sciweavers

30 search results - page 3 / 6
» Blockcipher-Based Hashing Revisited
Sort
View
DI
2006
114views more  DI 2006»
14 years 9 months ago
md5bloom: Forensic filesystem hashing revisited
Vassil Roussev, Yixin Chen, Timothy Bourg, Golden ...
PROVSEC
2010
Springer
14 years 7 months ago
Distinguishing Distributions Using Chernoff Information
Abstract. In this paper, we study the soundness amplification by repetition of cryptographic protocols. As a tool, we use the Chernoff Information. We specify the number of attempt...
Thomas Baignères, Pouyan Sepehrdad, Serge V...
IJNSEC
2008
113views more  IJNSEC 2008»
14 years 9 months ago
Multi-Designated Verifiers Signatures Revisited
Multi-Designated Verifier Signatures (MDVS) are privacy-oriented signatures that can only be verified by a set of users specified by the signer. We propose two new generic constru...
Sherman S. M. Chow
PDIS
1993
IEEE
15 years 1 months ago
Nested Loops Revisited
The research communityhas considered hash-based parallel joinalgorithmsthe algorithmsof choice for almosta decade. However, almostnone ofthe commercialparallel database systems us...
David J. DeWitt, Jeffrey F. Naughton, Joseph Burge...
PODC
2003
ACM
15 years 2 months ago
Routing networks for distributed hash tables
Routing topologies for distributed hashing in peer-to-peer networks are classified into two categories: deterministic and randomized. A general technique for constructing determi...
Gurmeet Singh Manku