메뉴 건너뛰기




Volumn 17, Issue 2, 1998, Pages 171-176

On probabilities of hash value matches

Author keywords

Cryptography; Databases; Hash functions; Indexing; Security

Indexed keywords


EID: 0039938988     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/S0167-4048(97)82016-0     Document Type: Article
Times cited : (21)

References (16)
  • 2
    • 0018455063 scopus 로고
    • Optimality properties of multiple key hash functions
    • A. Bolour, "Optimality Properties of Multiple Key Hash Functions," Journal of the ACM, 26(2), 196-210, 1979.
    • (1979) Journal of the ACM , vol.26 , Issue.2 , pp. 196-210
    • Bolour, A.1
  • 4
    • 85028868533 scopus 로고
    • Collision free hash functions and public key signature schemes
    • Eurocrypt '87, LNCS 304, 203-216, Springer-Verlag
    • I. B. Damgard, "Collision Free Hash Functions and Public Key Signature Schemes," Advances in Cryptography, Eurocrypt '87, LNCS 304, 203-216, 1987, Springer-Verlag.
    • (1987) Advances in Cryptography
    • Damgard, I.B.1
  • 5
    • 84981199109 scopus 로고
    • A design principle for hash functions
    • Crypto '89, LNCS 435, 416-427, Springer-Verlag
    • I. B. Damgard, "A Design Principle for Hash Functions," Advances in Cryptology, Crypto '89, LNCS 435, 416-427, 1989, Springer-Verlag.
    • (1989) Advances in Cryptology
    • Damgard, I.B.1
  • 8
    • 0015670872 scopus 로고
    • General performance analysis of key-to-address transformation methods using an abstract file concept
    • October
    • V. Lum, "General Performance Analysis of Key-to-Address Transformation Methods Using an Abstract File Concept," Communications of the ACM, 16(10), 603-612, October 1973.
    • (1973) Communications of the ACM , vol.16 , Issue.10 , pp. 603-612
    • Lum, V.1
  • 10
    • 0012693047 scopus 로고
    • Scatter storage techniques
    • Jan.
    • R. Morris, "Scatter Storage Techniques," Communications of the ACM, 11(1), 38-44, Jan. 1968.
    • (1968) Communications of the ACM , vol.11 , Issue.1 , pp. 38-44
    • Morris, R.1
  • 13
    • 0028407954 scopus 로고
    • Combinatorial techniques for universal hashing
    • D. Stinson, "Combinatorial Techniques for Universal Hashing" Journal of Computer and System Sciences, 48, 337-346, 1994.
    • (1994) Journal of Computer and System Sciences , vol.48 , pp. 337-346
    • Stinson, D.1
  • 14
    • 84976859875 scopus 로고
    • A note on the efficiency of hashing functions
    • July
    • J. D. Ullman, "A Note on the Efficiency of Hashing Functions", Journal of the ACM, 19(3), 569-575, July 1972.
    • (1972) Journal of the ACM , vol.19 , Issue.3 , pp. 569-575
    • Ullman, J.D.1
  • 16
    • 0019572642 scopus 로고
    • New hash functions and their use in authentication and set quality
    • M. N. Wegman, J. L. Carter, "New Hash Functions and Their Use in Authentication and Set quality," Journal of Computer and System Sciences, 22, 265-279, 1981.
    • (1981) Journal of Computer and System Sciences , vol.22 , pp. 265-279
    • Wegman, M.N.1    Carter, J.L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.