Sciweavers

465 search results - page 13 / 93
» Programmable Hash Functions and Their Applications
Sort
View
NETWORKING
2004
14 years 11 months ago
Network-Embedded Programmable Storage and Its Applications
We consider the utility of two key properties of network-embedded storage: programmability and network-awareness. We describe two extensive applications, whose performance and fun...
Sumeet Sobti, Junwen Lai, Yilei Shao, Nitin Garg, ...
ISVLSI
2006
IEEE
114views VLSI» more  ISVLSI 2006»
15 years 3 months ago
A Low Power Lookup Technique for Multi-Hashing Network Applications
Many network security applications require large virus signature sets to be maintained, retrieved, and compared against the network streams. Software applications frequently fail ...
Ilhan Kaya, Taskin Koçak
CRYPTO
1991
Springer
105views Cryptology» more  CRYPTO 1991»
15 years 1 months ago
Universal Hashing and Authentication Codes
In this paper, we study the application of universal hashingto the construction of unconditionally secure authentication codes without secrecy. This idea is most useful when the nu...
Douglas R. Stinson
DAC
1999
ACM
15 years 11 months ago
Robust FPGA Intellectual Property Protection Through Multiple Small Watermarks
A number of researchers have proposed using digital marks to provide ownership identification for intellectual property. Many of these techniques share three specific weaknesses: ...
John Lach, William H. Mangione-Smith, Miodrag Potk...
CCS
2008
ACM
14 years 12 months ago
HMAC is a randomness extractor and applications to TLS
In this paper, we study the security of a practical randomness extractor and its application in the tls standard. Randomness extraction is the first stage of key derivation functi...
Pierre-Alain Fouque, David Pointcheval, Séb...