Sciweavers

713 search results - page 55 / 143
» Dispersing Hash Functions
Sort
View
FPL
2010
Springer
129views Hardware» more  FPL 2010»
14 years 7 months ago
FPGA Implementations of the Round Two SHA-3 Candidates
Abstract--The second round of the NIST-run public competition is underway to find a new hash algorithm(s) for inclusion in the NIST Secure Hash Standard (SHA-3). This paper present...
Brian Baldwin, Andrew Byrne, Liang Lu, Mark Hamilt...
FSE
2010
Springer
144views Cryptology» more  FSE 2010»
15 years 2 months ago
Pseudo-cryptanalysis of the Original Blue Midnight Wish
The hash function Blue Midnight Wish (BMW) is a candidate in the SHA-3 competition organised by the U.S. National Institute of Standards and Technology (NIST). BMW was selected fo...
Søren S. Thomsen
INDOCRYPT
2009
Springer
15 years 4 months ago
Second Preimage Attack on SHAMATA-512
We present a second preimage attack on SHAMATA-512, which is a hash function of 512bit output and one of the first round candidates of the SHA-3 competition. The attack uses diļ¬...
Kota Ideguchi, Dai Watanabe
ICMCS
2005
IEEE
88views Multimedia» more  ICMCS 2005»
15 years 3 months ago
Hash-based Counter Scheme for Digital Rights Management
This paper describes a counter scheme that uses hash functions to count how many times the user is allowed to play protected content in a DRM-enabled player. The proposed basic sc...
Mikko Löytynoja, Tapio Seppänen
ERCIMDL
2005
Springer
91views Education» more  ERCIMDL 2005»
15 years 3 months ago
LibraRing: An Architecture for Distributed Digital Libraries Based on DHTs
We present a digital library architecture based on distributed hash tables. We discuss the main components of this architecture and the protocols for offering information retrieva...
Christos Tryfonopoulos, Stratos Idreos, Manolis Ko...