Sciweavers

4438 search results - page 33 / 888
» On the Distribution of Keys by Hashing
Sort
View
EUROCRYPT
2003
Springer
15 years 5 months ago
A Framework for Password-Based Authenticated Key Exchange
Abstract. In this paper we present a general framework for passwordbased authenticated key exchange protocols, in the common reference odel. Our protocol is actually an abstraction...
Rosario Gennaro, Yehuda Lindell
135
Voted
CTRSA
2010
Springer
257views Cryptology» more  CTRSA 2010»
15 years 6 months ago
Practical Key Recovery Attack against Secret-IV Edon-
Abstract. The SHA-3 competition has been organized by NIST to select a new hashing standard. Edon-R was one of the fastest candidates in the first round of the competition. In thi...
Gaëtan Leurent
PKC
2012
Springer
237views Cryptology» more  PKC 2012»
13 years 2 months ago
Relatively-Sound NIZKs and Password-Based Key-Exchange
We define a new notion of relatively-sound non-interactive zeroknowledge (NIZK) proofs, where a private verifier with access to a trapdoor continues to be sound even when the Ad...
Charanjit S. Jutla, Arnab Roy
ALENEX
2009
191views Algorithms» more  ALENEX 2009»
15 years 27 days ago
Theory and Practise of Monotone Minimal Perfect Hashing
Minimal perfect hash functions have been shown to be useful to compress data in several data management tasks. In particular, order-preserving minimal perfect hash functions [10] ...
Djamal Belazzougui, Paolo Boldi, Rasmus Pagh, Seba...
WEA
2005
Springer
138views Algorithms» more  WEA 2005»
15 years 5 months ago
A Practical Minimal Perfect Hashing Method
We propose a novel algorithm based on random graphs to construct minimal perfect hash functions h. For a set of n keys, our algorithm outputs h in expected time O(n). The evaluatio...
Fabiano C. Botelho, Yoshiharu Kohayakawa, Nivio Zi...