15.02.2014 Views

A Bibliography of Publications on Hashing Algorithms - Index of files in

A Bibliography of Publications on Hashing Algorithms - Index of files in

A Bibliography of Publications on Hashing Algorithms - Index of files in

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

REFERENCES 128<br />

volume 963 <str<strong>on</strong>g>of</str<strong>on</strong>g> Lecture Notes<br />

<strong>in</strong> Computer Science. Spr<strong>in</strong>ger-Verlag,<br />

Berl<strong>in</strong>, Germany /<br />

Heidelberg, Germany / L<strong>on</strong>d<strong>on</strong>,<br />

UK / etc., 1995. CO-<br />

DEN LNCSD9. ISBN 3-540-<br />

60221-6 (Berl<strong>in</strong>). ISSN 0302-<br />

9743 (pr<strong>in</strong>t), 1611-3349 (electr<strong>on</strong>ic).<br />

LCCN QA76.9.A25<br />

C79 1995. URL http://<br />

l<strong>in</strong>k.spr<strong>in</strong>ger-ny.com/l<strong>in</strong>k/<br />

service/series/0558/tocs/<br />

t0963.htm; http://www.<br />

spr<strong>in</strong>gerl<strong>in</strong>k.com/openurl.<br />

asp?genre=issue&issn=0302-<br />

9743&volume=963. Sp<strong>on</strong>sored<br />

by the Internati<strong>on</strong>al Associati<strong>on</strong><br />

for Cryptologic Research<br />

(IACR), <strong>in</strong> cooperati<strong>on</strong> with<br />

the IEEE Computer Society<br />

Technical Committee <strong>on</strong> Security<br />

and Privacy.<br />

Cor<strong>on</strong>:2000:ESF<br />

[Cor00] Jean-Sébastien Cor<strong>on</strong>. On<br />

the exact security <str<strong>on</strong>g>of</str<strong>on</strong>g> full doma<strong>in</strong><br />

hash. In Bellare [Bel00],<br />

pages 229–?? ISBN 3-<br />

540-67907-3. ISSN 0302-<br />

9743 (pr<strong>in</strong>t), 1611-3349 (electr<strong>on</strong>ic).<br />

LCCN QA76.9.A25<br />

C79 2000 Bar. URL http://<br />

l<strong>in</strong>k.spr<strong>in</strong>ger-ny.com/l<strong>in</strong>k/ [CP91a]<br />

service/series/0558/bibs/<br />

1880/18800229.htm; http:<br />

//l<strong>in</strong>k.spr<strong>in</strong>ger-ny.com/l<strong>in</strong>k/<br />

service/series/0558/papers/<br />

1880/18800229.pdf.<br />

Cor<strong>on</strong>:2002:SPP<br />

Yung [Yun02], pages 613–<br />

626. CODEN LNCSD9.<br />

ISBN 3-540-44050-X (paperback).<br />

ISSN 0302-9743 (pr<strong>in</strong>t),<br />

1611-3349 (electr<strong>on</strong>ic). LCCN<br />

QA76.9.A25 C79 2002. URL<br />

http://l<strong>in</strong>k.spr<strong>in</strong>ger.de/<br />

l<strong>in</strong>k/service/series/0558/<br />

bibs/2442/24420613.htm;<br />

http://l<strong>in</strong>k.spr<strong>in</strong>ger.de/<br />

l<strong>in</strong>k/service/series/0558/<br />

papers/2442/24420613.pdf.<br />

Chaum:1987:ACE<br />

[CP87] David Chaum and Wyn L.<br />

Price, editors. Advances<br />

<strong>in</strong> Cryptology–EUROCRYPT<br />

’87: Workshop <strong>on</strong> the Theory<br />

and Applicati<strong>on</strong> <str<strong>on</strong>g>of</str<strong>on</strong>g> Cryptographic<br />

Techniques, Amsterdam,<br />

The Netherlands, April<br />

13–15, 1987: Proceed<strong>in</strong>gs, volume<br />

304 <str<strong>on</strong>g>of</str<strong>on</strong>g> Lecture Notes <strong>in</strong><br />

Computer Science. Spr<strong>in</strong>ger-<br />

Verlag, Berl<strong>in</strong>, Germany / Heidelberg,<br />

Germany / L<strong>on</strong>d<strong>on</strong>,<br />

UK / etc., 1987. ISBN 0-<br />

387-19102-X (New York), 3-<br />

540-19102-X (Berl<strong>in</strong>). LCCN<br />

QA76.9.A25 E963 1987.<br />

Cai:1991:MNH<br />

Jiazhen Cai and Robert Paige.<br />

“Look Ma, no hash<strong>in</strong>g, and<br />

no arrays neither”. In ACM-<br />

POPL’91 [ACM91d], pages<br />

143–154. ISBN 0-89791-419-8.<br />

LCCN QA76.7 .A15 1991.<br />

Cai:1991:LMN<br />

[Cor02] Jean-Sébastien Cor<strong>on</strong>. Security<br />

pro<str<strong>on</strong>g>of</str<strong>on</strong>g> for partial-doma<strong>in</strong><br />

hash signature schemes. In<br />

[CP91b] Jiazhen Cai and Robert A.<br />

Paige. Look ma, no hash<strong>in</strong>g,<br />

and no arrays neither. In

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!