Sciweavers

4438 search results - page 53 / 888
» On the Distribution of Keys by Hashing
Sort
View
CN
1999
119views more  CN 1999»
14 years 11 months ago
Web Caching with Consistent Hashing
A key performance measure for the World Wide Web is the speed with which content is served to users. As traffic on the Web increases, users are faced with increasing delays and fa...
David R. Karger, Alex Sherman, Andy Berkheimer, Bi...
ASIACRYPT
2004
Springer
15 years 5 months ago
Higher Order Universal One-Way Hash Functions
Universal One-Way Hash Functions (UOWHFs) are families of cryptographic hash functions for which first a target input is chosen and subsequently a key which selects a member from ...
Deukjo Hong, Bart Preneel, Sangjin Lee
NDSS
2000
IEEE
15 years 4 months ago
Chameleon Signatures
Abstract. Chameleon signatures simultaneously provide the properties of nonrepudiation and non-transferability for the signed message. However, the initial constructions of chamele...
Hugo Krawczyk, Tal Rabin
COCO
2007
Springer
88views Algorithms» more  COCO 2007»
15 years 6 months ago
A New Interactive Hashing Theorem
Interactive hashing, introduced by Naor, Ostrovsky, Venkatesan and Yung (CRYPTO ’92), plays an important role in many cryptographic protocols. In particular, it is a major compo...
Iftach Haitner, Omer Reingold
ICDCSW
2003
IEEE
15 years 5 months ago
Foundations of Security for Hash Chains in Ad Hoc Networks
Nodes in ad hoc networks generally transmit data at regular intervals over long periods of time. Recently, ad hoc network nodes have been built that run on little power and have v...
Phillip G. Bradford, Olga V. Gavrylyako