We present a second preimage attack on SHAMATA-512, which is a hash function of 512bit output and one of the ļ¬rst round candidates of the SHA-3 competition. The attack uses diļ¬...
This paper describes a counter scheme that uses hash functions to count how many times the user is allowed to play protected content in a DRM-enabled player. The proposed basic sc...
We present a digital library architecture based on distributed hash tables. We discuss the main components of this architecture and the protocols for oļ¬ering information retrieva...
We introduce a technique for traversal of Merkle trees, and propose an eļ¬cient algorithm that generates a sequence of leaves along with their associated authentication paths. For...
Markus Jakobsson, Frank Thomson Leighton, Silvio M...
This paper proposes a hash function family based on feature vocabularies and investigates the application in building indexes for image search. Each hash function is associated wi...