-
1
-
-
0001011699
-
A fast and simple randomized parallel algorithm for the maximal independent set problem
-
N. Alon, L. Babai and Alon Itai, A fast and simple randomized parallel algorithm for the maximal independent set problem, Journal of Algorithms 7(4) (1986) 567-583.
-
(1986)
Journal of Algorithms
, vol.7
, Issue.4
, pp. 567-583
-
-
Alon, N.1
Babai, L.2
Alon Itai3
-
4
-
-
0022198802
-
The bit extraction problem or t-resilient functions
-
B. Chor, J. Freidmann, O. Goldreich, J. Håstad, S. Rudich and R. Smolensky, The bit extraction problem or t -resilient functions, in: Proc. 26th FOCS (1985) pp. 396-407.
-
(1985)
Proc. 26th FOCS
, pp. 396-407
-
-
Chor, B.1
Freidmann, J.2
Goldreich, O.3
Håstad, J.4
Rudich, S.5
Smolensky, R.6
-
9
-
-
0019634370
-
Password authentication with insecure communication
-
L. Lamport, Password authentication with insecure communication. Communications of the ACM 24(11) (1981) 770-772.
-
(1981)
Communications of the ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
10
-
-
38149074447
-
The computational complexity of universal hashing
-
Y. Mansour, N. Nisan and P. Tiwari, The computational complexity of universal hashing, Theoretical Computer Science 107(1) (1993) 121-133.
-
(1993)
Theoretical Computer Science
, vol.107
, Issue.1
, pp. 121-133
-
-
Mansour, Y.1
Nisan, N.2
Tiwari, P.3
-
11
-
-
0020246424
-
On the program size of perfect and universal hash functions
-
K. Mehlhorn, On the program size of perfect and universal hash functions, in: Foundations of Computer Science FOCS (1982).
-
(1982)
Foundations of Computer Science FOCS
-
-
Mehlhorn, K.1
-
13
-
-
0036738266
-
SPINS, Security protocols for sensor networks
-
A. Perrig, R. Szewczyk, J.D. Tygar, V. Wen and D.E. Culler, SPINS, Security protocols for sensor networks, Wireless Networks 8 (2002) 521-534.
-
(2002)
Wireless Networks
, vol.8
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.D.3
Wen, V.4
Culler, D.E.5
-
15
-
-
10044227273
-
Forwards and backwards encryption
-
R.L. Rivest, Forwards and backwards encryption, Cryptologia 4(1) (1980) 30-33.
-
(1980)
Cryptologia
, vol.4
, Issue.1
, pp. 30-33
-
-
Rivest, R.L.1
-
17
-
-
84890522850
-
Communication theory of secrecy systems
-
C.E. Shannon, Communication theory of secrecy systems, Bell Systems Technical Journal 28 (1949) 656-715.
-
(1949)
Bell Systems Technical Journal
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
19
-
-
18144368292
-
Some observations on the theory of cryptographic hash functions
-
(Sept.)
-
D.R. Stinson, Some observations on the theory of cryptographic hash functions, Manuscript (Sept. 2002).
-
(2002)
Manuscript
-
-
Stinson, D.R.1
-
21
-
-
0019572642
-
New hash functions and their use in authentication and set equality
-
M.N. Wegman and J.L. Carter, New hash functions and their use in authentication and set equality, Journal of Computer and System Sciences 22(3) (1981) 265-279.
-
(1981)
Journal of Computer and System Sciences
, vol.22
, Issue.3
, pp. 265-279
-
-
Wegman, M.N.1
Carter, J.L.2
|