Sciweavers

658 search results - page 45 / 132
» The Grindahl Hash Functions
Sort
View
EUROCRYPT
2000
Springer
15 years 1 months ago
Using Hash Functions as a Hedge against Chosen Ciphertext Attack
The cryptosystem recently proposed by Cramer and Shoup [CS98] is a practical public key cryptosystem that is secure against adaptive chosen ciphertext attack provided the Decision...
Victor Shoup
ICALP
2000
Springer
15 years 1 months ago
Dispersing Hash Functions
Rasmus Pagh
CRYPTO
1995
Springer
118views Cryptology» more  CRYPTO 1995»
15 years 1 months ago
MDx-MAC and Building Fast MACs from Hash Functions
Bart Preneel, Paul C. van Oorschot
ICCV
1995
IEEE
15 years 1 months ago
Learning Geometric Hashing Functions for Model-Based Object Recognition
George Bebis, Michael Georgiopoulos, Niels da Vito...