Sciweavers

658 search results - page 57 / 132
» The Grindahl Hash Functions
Sort
View
INDOCRYPT
2009
Springer
15 years 4 months ago
Second Preimage Attack on SHAMATA-512
We present a second preimage attack on SHAMATA-512, which is a hash function of 512bit output and one of the first round candidates of the SHA-3 competition. The attack uses diļ¬...
Kota Ideguchi, Dai Watanabe
ICMCS
2005
IEEE
88views Multimedia» more  ICMCS 2005»
15 years 3 months ago
Hash-based Counter Scheme for Digital Rights Management
This paper describes a counter scheme that uses hash functions to count how many times the user is allowed to play protected content in a DRM-enabled player. The proposed basic sc...
Mikko Löytynoja, Tapio Seppänen
ERCIMDL
2005
Springer
91views Education» more  ERCIMDL 2005»
15 years 3 months ago
LibraRing: An Architecture for Distributed Digital Libraries Based on DHTs
We present a digital library architecture based on distributed hash tables. We discuss the main components of this architecture and the protocols for offering information retrieva...
Christos Tryfonopoulos, Stratos Idreos, Manolis Ko...
CTRSA
2003
Springer
114views Cryptology» more  CTRSA 2003»
15 years 3 months ago
Fractal Merkle Tree Representation and Traversal
We introduce a technique for traversal of Merkle trees, and propose an efficient algorithm that generates a sequence of leaves along with their associated authentication paths. For...
Markus Jakobsson, Frank Thomson Leighton, Silvio M...
MM
2009
ACM
118views Multimedia» more  MM 2009»
15 years 4 months ago
Vocabulary-based hashing for image search
This paper proposes a hash function family based on feature vocabularies and investigates the application in building indexes for image search. Each hash function is associated wi...
Yingyu Liang, Jianmin Li, Bo Zhang