Sciweavers

658 search results - page 98 / 132
» The Grindahl Hash Functions
Sort
View
P2P
2008
IEEE
15 years 4 months ago
P2P Information Retrieval and Filtering with MAPS
In this demonstration paper we present MAPS, a novel system that combines approximate information retrieval and filtering functionality in a peer-to-peer setting. In MAPS, a user...
Christian Zimmer, Johannes Heinz, Christos Tryfono...
74
Voted
COMPSAC
2000
IEEE
15 years 2 months ago
Practical Key Distribution Schemes for Channel Protection
– This paper presents three key distribution schemes for channel protection. With the proposed schemes, encryption keys of the ordered programs can be distributed to the authoriz...
Yu-Lun Huang, Shiuh-Pyng Winston Shieh, Jian-Chyua...
ASIACRYPT
2006
Springer
15 years 1 months ago
Almost Optimum Secret Sharing Schemes Secure Against Cheating for Arbitrary Secret Distribution
We consider the problem of cheating in secret sharing schemes, cheating in which individuals submit forged shares in the secret reconstruction phase in an effort to make another pa...
Satoshi Obana, Toshinori Araki
CANS
2008
Springer
198views Cryptology» more  CANS 2008»
14 years 11 months ago
3D: A Three-Dimensional Block Cipher
Abstract. The main contribution of this paper is a new iterated secretkey block cipher called 3D, inspired by the AES cipher. The 3D cipher has an SPN design, operates on 512-bit b...
Jorge Nakahara Jr.
SODA
2004
ACM
137views Algorithms» more  SODA 2004»
14 years 11 months ago
The Bloomier filter: an efficient data structure for static support lookup tables
We introduce the Bloomier filter, a data structure for compactly encoding a function with static support in order to support approximate evaluation queries. Our construction gener...
Bernard Chazelle, Joe Kilian, Ronitt Rubinfeld, Ay...