15.02.2014 Views

A Bibliography of Publications on Hashing Algorithms - Index of files in

A Bibliography of Publications on Hashing Algorithms - Index of files in

A Bibliography of Publications on Hashing Algorithms - Index of files in

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

REFERENCES 308<br />

Preneel:1995:MMB<br />

[PvO95] B. Preneel and P. C. van<br />

Oorschot. MD-x MAC and<br />

build<strong>in</strong>g fast MACs from hash<br />

functi<strong>on</strong>s. In Coppersmith<br />

[Cop95b], pages 1–14. CO-<br />

DEN LNCSD9. ISBN 3-540-<br />

60221-6 (Berl<strong>in</strong>). ISSN 0302-<br />

9743 (pr<strong>in</strong>t), 1611-3349 (electr<strong>on</strong>ic).<br />

LCCN QA76.9.A25<br />

C79 1995. URL http://<br />

l<strong>in</strong>k.spr<strong>in</strong>ger-ny.com/l<strong>in</strong>k/<br />

service/series/0558/tocs/<br />

t0963.htm; http://www.<br />

spr<strong>in</strong>gerl<strong>in</strong>k.com/openurl.<br />

asp?genre=issue&issn=0302-<br />

9743&volume=963. Sp<strong>on</strong>sored<br />

by the Internati<strong>on</strong>al Associati<strong>on</strong><br />

for Cryptologic Research<br />

(IACR), <strong>in</strong> cooperati<strong>on</strong> with<br />

the IEEE Computer Society<br />

Technical Committee <strong>on</strong> Security<br />

and Privacy.<br />

Piper:1993:DSH<br />

[PW93] F. Piper and P. Wild. Digital<br />

signatures and hash functi<strong>on</strong>s.<br />

In An<strong>on</strong>ymous [Ano93a], pages<br />

124–130. ISBN 1-85617-211-2.<br />

LCCN ????<br />

Prasanna:1994:SDP<br />

[PW94] V. K. Prasanna and C.-L.<br />

Wang. Scalable data parallel<br />

object recogniti<strong>on</strong> us<strong>in</strong>g geometric<br />

hash<strong>in</strong>g <strong>on</strong> the CM-5. In<br />

IEEE [IEE94c], pages 817–824.<br />

ISBN 0-8186-5680-8, 0-8186-<br />

5681-6. LCCN QA76.58.S32<br />

1994.<br />

Peikert:2008:LTF<br />

[PW08]<br />

Chris Peikert and Brent Waters.<br />

Lossy trapdoor functi<strong>on</strong>s<br />

and their applicati<strong>on</strong>s. In<br />

ACM [ACM08b], pages 187–<br />

196. ISBN 1-60558-047-3.<br />

LCCN QA76.6 .A152 2008.<br />

Pagh:2010:COH<br />

[PWYZ10] Rasmus Pagh, Zhewei Wei,<br />

Ke Yi, and Q<strong>in</strong> Zhang. Cacheoblivious<br />

hash<strong>in</strong>g. In Van<br />

Gucht [Van10], pages 297–304.<br />

ISBN 1-4503-0033-2. LCCN<br />

????<br />

Pittel:1988:STE<br />

[PY88] Boris Pittel and Jenn-Hwa<br />

Yu. On search times for<br />

early-<strong>in</strong>serti<strong>on</strong> coalesced hash<strong>in</strong>g.<br />

SIAM Journal <strong>on</strong> Comput<strong>in</strong>g,<br />

17(3):492–503, June 1988.<br />

CODEN SMJCAT. ISSN 0097-<br />

5397 (pr<strong>in</strong>t), 1095-7111 (electr<strong>on</strong>ic).<br />

[QCH + 81]<br />

[QD02]<br />

Quittner:1981:CSH<br />

P. Quittner, S. Csoka, S. Halasz,<br />

D. Kotsis, and K. Varnai.<br />

Comparis<strong>on</strong> <str<strong>on</strong>g>of</str<strong>on</strong>g> syn<strong>on</strong>ym<br />

handl<strong>in</strong>g and bucket organizati<strong>on</strong><br />

methods. Communicati<strong>on</strong>s<br />

<str<strong>on</strong>g>of</str<strong>on</strong>g> the Associati<strong>on</strong> for Comput<strong>in</strong>g<br />

Mach<strong>in</strong>ery, 24(9):579–<br />

582, September 1981. CO-<br />

DEN CACMA2. ISSN 0001-<br />

0782 (pr<strong>in</strong>t), 1557-7317 (electr<strong>on</strong>ic).<br />

Qu<strong>in</strong>lan:2002:VNA<br />

Sean Qu<strong>in</strong>lan and Sean Dorward.<br />

Venti: a new approach<br />

to archival storage. Technical<br />

report, Comput<strong>in</strong>g Sciences<br />

Research Center, Bell Laboratories,<br />

Murray Hill, NJ, USA,

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!