Abstract--The second round of the NIST-run public competition is underway to find a new hash algorithm(s) for inclusion in the NIST Secure Hash Standard (SHA-3). This paper present...
Brian Baldwin, Andrew Byrne, Liang Lu, Mark Hamilt...
The hash function Blue Midnight Wish (BMW) is a candidate in the SHA-3 competition organised by the U.S. National Institute of Standards and Technology (NIST). BMW was selected fo...
We present a second preimage attack on SHAMATA-512, which is a hash function of 512bit output and one of the ļ¬rst round candidates of the SHA-3 competition. The attack uses diļ¬...
This paper describes a counter scheme that uses hash functions to count how many times the user is allowed to play protected content in a DRM-enabled player. The proposed basic sc...
We present a digital library architecture based on distributed hash tables. We discuss the main components of this architecture and the protocols for oļ¬ering information retrieva...