15.02.2014 Views

A Bibliography of Publications on Hashing Algorithms - Index of files in

A Bibliography of Publications on Hashing Algorithms - Index of files in

A Bibliography of Publications on Hashing Algorithms - Index of files in

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

REFERENCES 86<br />

puter architecture for a surrogate<br />

file to a very large<br />

data/knowledge base. Computer,<br />

20(3):25–32, March 1987.<br />

CODEN CPTRB4. ISSN 0018-<br />

9162 (pr<strong>in</strong>t), 1558-0814 (electr<strong>on</strong>ic).<br />

Bellare:1996:KHF<br />

[BCK96a] M. Bellare, R. Canetti, and<br />

H. Krawczyk. Key<strong>in</strong>g hash<br />

functi<strong>on</strong>s for message authenticati<strong>on</strong>.<br />

Lecture Notes <strong>in</strong><br />

CS, 1109:1–15, 1996. CO-<br />

DEN LNCSD9. ISSN 0302-<br />

9743 (pr<strong>in</strong>t), 1611-3349 (electr<strong>on</strong>ic).<br />

URL Full versi<strong>on</strong>:<br />

http://www.research.ibm.<br />

com/security/.<br />

[BCK96b]<br />

Bellare:1996:MAU<br />

Mihir Bellare, Ran Canetti, and<br />

Hugo Krawczyk. Message authenticati<strong>on</strong><br />

us<strong>in</strong>g hash functi<strong>on</strong>s:<br />

the HMAC c<strong>on</strong>structi<strong>on</strong>.<br />

CryptoBytes, 2(1):12–15,<br />

Spr<strong>in</strong>g 1996. URL ftp://ftp.<br />

rsa.com/pub/cryptobytes/<br />

crypto2n1.pdf.<br />

Bedau:2004:CHF<br />

[BCR04] M. Bedau, R. E. Crandall,<br />

and M. Raven. Cryptographic<br />

hash functi<strong>on</strong>s based <strong>on</strong> Artificial<br />

Life. Report, Reed College,<br />

Portland, OR, USA, 2004.<br />

20 pp. URL http://people.<br />

reed.edu/~crandall/papers/<br />

crypto8.pdf.<br />

[BCR10]<br />

Barr:2010:TCS<br />

Thomas W. Barr, Alan L. Cox,<br />

and Scott Rixner. Translati<strong>on</strong><br />

cach<strong>in</strong>g: skip, d<strong>on</strong>’t walk (the<br />

page table). ACM SIGARCH<br />

Computer Architecture News,<br />

38(3):48–59, June 2010. CO-<br />

DEN CANED2. ISSN 0163-<br />

5964 (pr<strong>in</strong>t), 1943-5851 (electr<strong>on</strong>ic).<br />

Bard<strong>in</strong>:1989:IUI<br />

[BCS89] B. Bard<strong>in</strong>, C. Colket, and<br />

D. Smith. Implementati<strong>on</strong> <str<strong>on</strong>g>of</str<strong>on</strong>g><br />

unsigned <strong>in</strong>tegers <strong>in</strong> ada. Ada<br />

Letters, 9(1):47–70, January–<br />

February 1989. CODEN<br />

AALEE5.<br />

Black:2009:IHE<br />

[BD82]<br />

[BD84]<br />

[BCS09] J. Black, M. Cochran, and<br />

T. Shrimpt<strong>on</strong>. On the impossibility<br />

<str<strong>on</strong>g>of</str<strong>on</strong>g> highly-efficient<br />

blockcipher-based hash functi<strong>on</strong>s.<br />

Journal <str<strong>on</strong>g>of</str<strong>on</strong>g> Cryptology,<br />

22(3):311–329, July 2009. CO-<br />

DEN JOCREQ. ISSN 0933-<br />

2790 (pr<strong>in</strong>t), 1432-1378 (electr<strong>on</strong>ic).<br />

URL http://www.<br />

spr<strong>in</strong>gerl<strong>in</strong>k.com/openurl.<br />

asp?genre=article&issn=0933-<br />

2790&volume=22&issue=3&spage=<br />

311.<br />

Bell:1982:KSC<br />

D. A. Bell and S. M. Deen. Key<br />

space compressi<strong>on</strong> and hash<strong>in</strong>g<br />

<strong>in</strong> PRECI. The Computer<br />

Journal, 25(4):486–492,<br />

November 1982. CODEN CM-<br />

PJA6. ISSN 0010-4620 (pr<strong>in</strong>t),<br />

1460-2067 (electr<strong>on</strong>ic).<br />

Bell:1984:HTV<br />

D. A. Bell and S. M. Deen. Hash<br />

trees versus B-Trees. The Computer<br />

Journal, 27(3):218–224,

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!