Sciweavers

713 search results - page 6 / 143
» Dispersing Hash Functions
Sort
View
PODS
2010
ACM
206views Database» more  PODS 2010»
15 years 2 months ago
Cache-oblivious hashing
The hash table, especially its external memory version, is one of the most important index structures in large databases. Assuming a truly random hash function, it is known that i...
Rasmus Pagh, Zhewei Wei, Ke Yi, Qin Zhang
GECCO
2006
Springer
202views Optimization» more  GECCO 2006»
15 years 1 months ago
Evolving hash functions by means of genetic programming
The design of hash functions by means of evolutionary computation is a relatively new and unexplored problem. In this work, we use Genetic Programming (GP) to evolve robust and fa...
César Estébanez, Julio César ...
ASIACRYPT
1991
Springer
15 years 1 months ago
Collisions for Schnorr's Hash Function FFT-Hash Presented at Crypto '91
A method is described to generate collisions for the hash function FFT-Hash that
Joan Daemen, Antoon Bosselaers, René Govaer...
CHES
2008
Springer
128views Cryptology» more  CHES 2008»
14 years 11 months ago
Hash Functions and RFID Tags: Mind the Gap
Abstract. The security challenges posed by RFID-tag deployments are wellknown. In response there is a rich literature on new cryptographic protocols and an on-tag hash function is ...
Andrey Bogdanov, Gregor Leander, Christof Paar, Ax...
ACISP
2008
Springer
15 years 4 months ago
Looking Back at a New Hash Function
Abstract. We present two (related) dedicated hash functions that deliberately borrow heavily from the block ciphers that appeared in the final stages of the AES process. We explor...
Olivier Billet, Matthew J. B. Robshaw, Yannick Seu...