Sciweavers

713 search results - page 104 / 143
» Dispersing Hash Functions
Sort
View
139
Voted
CANS
2008
Springer
198views Cryptology» more  CANS 2008»
15 years 3 months ago
3D: A Three-Dimensional Block Cipher
Abstract. The main contribution of this paper is a new iterated secretkey block cipher called 3D, inspired by the AES cipher. The 3D cipher has an SPN design, operates on 512-bit b...
Jorge Nakahara Jr.
117
Voted
SODA
2004
ACM
137views Algorithms» more  SODA 2004»
15 years 3 months ago
The Bloomier filter: an efficient data structure for static support lookup tables
We introduce the Bloomier filter, a data structure for compactly encoding a function with static support in order to support approximate evaluation queries. Our construction gener...
Bernard Chazelle, Joe Kilian, Ronitt Rubinfeld, Ay...
JSW
2008
101views more  JSW 2008»
15 years 1 months ago
Broadcast Authentication with Practically Unbounded One-way Chains
A protocol for assuring the authenticity of information broadcasted over long periods of time is proposed. The protocol is based on time synchronization and uses one-way chains con...
Bogdan Groza
IS
2002
15 years 1 months ago
Signature-based structures for objects with set-valued attributes
Aiming at the efficient retrieval of objects with set-valued attributes, we introduce three variations of a new method in order to satisfy subset and superset queries. Our approac...
Eleni Tousidou, Panayiotis Bozanis, Yannis Manolop...
ESORICS
2009
Springer
16 years 2 months ago
Formal Indistinguishability Extended to the Random Oracle Model
Abstract. Several generic constructions for transforming one-way functions to asymmetric encryption schemes have been proposed. One-way functions only guarantee the weak secrecy of...
Cristian Ene, Yassine Lakhnech, Van Chan Ngo