15.02.2014 Views

A Bibliography of Publications on Hashing Algorithms - Index of files in

A Bibliography of Publications on Hashing Algorithms - Index of files in

A Bibliography of Publications on Hashing Algorithms - Index of files in

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

REFERENCES 243<br />

[KVK12]<br />

[KW94]<br />

ISSN 0302-9743 (pr<strong>in</strong>t), 1611-<br />

3349 (electr<strong>on</strong>ic). URL<br />

http://l<strong>in</strong>k.spr<strong>in</strong>ger.com/<br />

c<strong>on</strong>tent/pdf/10.1007/978-3-<br />

642-10366-7_37.<br />

Kortela<strong>in</strong>en:2012:GIH<br />

Tuomas Kortela<strong>in</strong>en, Ari Vesanen,<br />

and Juha Kortela<strong>in</strong>en.<br />

Generalized iterated hash functi<strong>on</strong>s<br />

revisited: New complexity<br />

bounds for multicollisi<strong>on</strong> attacks.<br />

Lecture Notes <strong>in</strong> CS,<br />

7668:172–190, 2012. CODEN<br />

LNCSD9. ISSN 0302-9743<br />

(pr<strong>in</strong>t), 1611-3349 (electr<strong>on</strong>ic).<br />

URL http://l<strong>in</strong>k.spr<strong>in</strong>ger.<br />

com/chapter/10.1007/978-3-<br />

642-34931-7_11/.<br />

Kroll:1994:DST<br />

Brigitte Kröll and Peter Widmayer.<br />

Distribut<strong>in</strong>g a search<br />

tree am<strong>on</strong>g a grow<strong>in</strong>g number<br />

<str<strong>on</strong>g>of</str<strong>on</strong>g> processors. SIGMOD Record<br />

(ACM Special Interest Group<br />

<strong>on</strong> Management <str<strong>on</strong>g>of</str<strong>on</strong>g> Data), 23<br />

(2):265–276, June 1994. CO-<br />

DEN SRECD8. ISSN 0163-5808<br />

(pr<strong>in</strong>t), 1943-5835 (electr<strong>on</strong>ic).<br />

Klassen:2012:ITB<br />

[KW12] Toryn Qwyllyn Klassen and<br />

Philipp Woelfel. Independence<br />

<str<strong>on</strong>g>of</str<strong>on</strong>g> tabulati<strong>on</strong>-based hash<br />

classes. Lecture Notes <strong>in</strong><br />

CS, 7256:506–517, 2012. CO-<br />

DEN LNCSD9. ISSN 0302-<br />

9743 (pr<strong>in</strong>t), 1611-3349 (electr<strong>on</strong>ic).<br />

URL http://l<strong>in</strong>k.<br />

spr<strong>in</strong>ger.com/c<strong>on</strong>tent/pdf/<br />

10.1007/978-3-642-29344-3_<br />

43.<br />

Kaps:2005:ESU<br />

[KYS05] J.-P. Kaps, K. Yuksel, and<br />

B. Sunar. Energy scalable universal<br />

hash<strong>in</strong>g. IEEE Transacti<strong>on</strong>s<br />

<strong>on</strong> Computers, 54(12):<br />

1484–1495, December 2005.<br />

CODEN ITCOB4. ISSN<br />

0018-9340 (pr<strong>in</strong>t), 1557-9956<br />

(electr<strong>on</strong>ic). URL http://<br />

ieeexplore.ieee.org/stamp/<br />

stamp.jsp?tp=&arnumber=1524931.<br />

Kjellberg:1984:CH<br />

[KZ84] Peter Kjellberg and Torben U.<br />

Zahle. Cascade hash<strong>in</strong>g. In<br />

VLDB, pages 481–492. VLDB<br />

Endowment, Saratoga, CA,<br />

USA, August 1984.<br />

Lai:1992:DSB<br />

[Lai92] Xuejia Lai. On the design<br />

and security <str<strong>on</strong>g>of</str<strong>on</strong>g> block ciphers.<br />

Hartung-Gorre Verlag, K<strong>on</strong>stanz,<br />

Switzerland, 1992. ISBN<br />

3-89191-573-X. xii + 108 pp.<br />

LCCN ??? This is the author’s<br />

Ph.D. dissertati<strong>on</strong>. “Secret-key<br />

block ciphers are the subject<br />

<str<strong>on</strong>g>of</str<strong>on</strong>g> this work. The design and<br />

security <str<strong>on</strong>g>of</str<strong>on</strong>g> block ciphers, together<br />

with their applicati<strong>on</strong><br />

<strong>in</strong> hash<strong>in</strong>g techniques, are c<strong>on</strong>sidered.<br />

In particular, iterated<br />

block ciphers that are based <strong>on</strong><br />

iterat<strong>in</strong>g a weak round functi<strong>on</strong><br />

several times are c<strong>on</strong>sidered.<br />

Four basic c<strong>on</strong>structi<strong>on</strong>s<br />

for the round functi<strong>on</strong> <str<strong>on</strong>g>of</str<strong>on</strong>g> an iterated<br />

cipher are studied.”.<br />

LakshmanYN:1996:IPI<br />

[Lak96] Lakshman Y. N., editor. IS-<br />

SAC ’96: Proceed<strong>in</strong>gs <str<strong>on</strong>g>of</str<strong>on</strong>g> the

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!