-
1
-
-
0003415652
-
-
Addison-Wesley, Reading, Mass.
-
A. Aho, J. Hopcroft, J. Ullman, The Design and Analysis of Computer Algorithms, Addison-Wesley, Reading, Mass., 1974.
-
(1974)
The Design and Analysis of Computer Algorithms
-
-
Aho, A.1
Hopcroft, J.2
Ullman, J.3
-
2
-
-
0018455063
-
Optimality properties of multiple key hash functions
-
A. Bolour, "Optimality Properties of Multiple Key Hash Functions," Journal of the ACM, 26(2), 196-210, 1979.
-
(1979)
Journal of the ACM
, vol.26
, Issue.2
, pp. 196-210
-
-
Bolour, A.1
-
3
-
-
0018456171
-
Universal classes of hash functions
-
J. L. Carter, M. N. Wegman, "Universal Classes of Hash Functions," Journal of Computer and System Sciences, 18, 143-154, 1979.
-
(1979)
Journal of Computer and System Sciences
, vol.18
, pp. 143-154
-
-
Carter, J.L.1
Wegman, M.N.2
-
4
-
-
85028868533
-
Collision free hash functions and public key signature schemes
-
Eurocrypt '87, LNCS 304, 203-216, Springer-Verlag
-
I. B. Damgard, "Collision Free Hash Functions and Public Key Signature Schemes," Advances in Cryptography, Eurocrypt '87, LNCS 304, 203-216, 1987, Springer-Verlag.
-
(1987)
Advances in Cryptography
-
-
Damgard, I.B.1
-
5
-
-
84981199109
-
A design principle for hash functions
-
Crypto '89, LNCS 435, 416-427, Springer-Verlag
-
I. B. Damgard, "A Design Principle for Hash Functions," Advances in Cryptology, Crypto '89, LNCS 435, 416-427, 1989, Springer-Verlag.
-
(1989)
Advances in Cryptology
-
-
Damgard, I.B.1
-
6
-
-
0021555016
-
A paradoxical solution to the signature problem
-
S. Goldwasser, S. Micali, R. Rivest, "A Paradoxical Solution to the Signature Problem," Proc. 25th IEEE Conf. on Foundations of Computer Science, 441-448, 1984.
-
(1984)
Proc. 25th IEEE Conf. on Foundations of Computer Science
, pp. 441-448
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.3
-
7
-
-
0003498504
-
-
Academic Press
-
I. S. Gradshtein, I. M. Ryzhik, Tables of Integrals, Series, and Products, Academic Press, 1980.
-
(1980)
Tables of Integrals, Series, and Products
-
-
Gradshtein, I.S.1
Ryzhik, I.M.2
-
8
-
-
0015670872
-
General performance analysis of key-to-address transformation methods using an abstract file concept
-
October
-
V. Lum, "General Performance Analysis of Key-to-Address Transformation Methods Using an Abstract File Concept," Communications of the ACM, 16(10), 603-612, October 1973.
-
(1973)
Communications of the ACM
, vol.16
, Issue.10
, pp. 603-612
-
-
Lum, V.1
-
9
-
-
0016486496
-
Hash table methods
-
W. D. Maurer, T. G. Lewis, "Hash Table Methods," ACM Computing Surveys, 7(1), 5-20, 1975.
-
(1975)
ACM Computing Surveys
, vol.7
, Issue.1
, pp. 5-20
-
-
Maurer, W.D.1
Lewis, T.G.2
-
10
-
-
0012693047
-
Scatter storage techniques
-
Jan.
-
R. Morris, "Scatter Storage Techniques," Communications of the ACM, 11(1), 38-44, Jan. 1968.
-
(1968)
Communications of the ACM
, vol.11
, Issue.1
, pp. 38-44
-
-
Morris, R.1
-
13
-
-
0028407954
-
Combinatorial techniques for universal hashing
-
D. Stinson, "Combinatorial Techniques for Universal Hashing" Journal of Computer and System Sciences, 48, 337-346, 1994.
-
(1994)
Journal of Computer and System Sciences
, vol.48
, pp. 337-346
-
-
Stinson, D.1
-
14
-
-
84976859875
-
A note on the efficiency of hashing functions
-
July
-
J. D. Ullman, "A Note on the Efficiency of Hashing Functions", Journal of the ACM, 19(3), 569-575, July 1972.
-
(1972)
Journal of the ACM
, vol.19
, Issue.3
, pp. 569-575
-
-
Ullman, J.D.1
-
16
-
-
0019572642
-
New hash functions and their use in authentication and set quality
-
M. N. Wegman, J. L. Carter, "New Hash Functions and Their Use in Authentication and Set quality," Journal of Computer and System Sciences, 22, 265-279, 1981.
-
(1981)
Journal of Computer and System Sciences
, vol.22
, pp. 265-279
-
-
Wegman, M.N.1
Carter, J.L.2
|