메뉴 건너뛰기




Volumn 8, Issue 2-3, 2005, Pages 189-195

Foundations of security for hash chains in ad hoc networks

Author keywords

Hash chains; K wise independence; Time space lower bound

Indexed keywords

ALGORITHMS; CRYPTOGRAPHY; MATHEMATICAL MODELS; NETWORK PROTOCOLS; PROBABILITY; SECURITY OF DATA;

EID: 18144391542     PISSN: 13867857     EISSN: None     Source Type: Journal    
DOI: 10.1007/s10586-005-6184-6     Document Type: Article
Times cited : (7)

References (21)
  • 1
    • 0001011699 scopus 로고
    • A fast and simple randomized parallel algorithm for the maximal independent set problem
    • N. Alon, L. Babai and Alon Itai, A fast and simple randomized parallel algorithm for the maximal independent set problem, Journal of Algorithms 7(4) (1986) 567-583.
    • (1986) Journal of Algorithms , vol.7 , Issue.4 , pp. 567-583
    • Alon, N.1    Babai, L.2    Alon Itai3
  • 9
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • L. Lamport, Password authentication with insecure communication. Communications of the ACM 24(11) (1981) 770-772.
    • (1981) Communications of the ACM , vol.24 , Issue.11 , pp. 770-772
    • Lamport, L.1
  • 10
    • 38149074447 scopus 로고
    • The computational complexity of universal hashing
    • Y. Mansour, N. Nisan and P. Tiwari, The computational complexity of universal hashing, Theoretical Computer Science 107(1) (1993) 121-133.
    • (1993) Theoretical Computer Science , vol.107 , Issue.1 , pp. 121-133
    • Mansour, Y.1    Nisan, N.2    Tiwari, P.3
  • 11
    • 0020246424 scopus 로고
    • On the program size of perfect and universal hash functions
    • K. Mehlhorn, On the program size of perfect and universal hash functions, in: Foundations of Computer Science FOCS (1982).
    • (1982) Foundations of Computer Science FOCS
    • Mehlhorn, K.1
  • 15
    • 10044227273 scopus 로고
    • Forwards and backwards encryption
    • R.L. Rivest, Forwards and backwards encryption, Cryptologia 4(1) (1980) 30-33.
    • (1980) Cryptologia , vol.4 , Issue.1 , pp. 30-33
    • Rivest, R.L.1
  • 17
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • C.E. Shannon, Communication theory of secrecy systems, Bell Systems Technical Journal 28 (1949) 656-715.
    • (1949) Bell Systems Technical Journal , vol.28 , pp. 656-715
    • Shannon, C.E.1
  • 19
    • 18144368292 scopus 로고    scopus 로고
    • Some observations on the theory of cryptographic hash functions
    • (Sept.)
    • D.R. Stinson, Some observations on the theory of cryptographic hash functions, Manuscript (Sept. 2002).
    • (2002) Manuscript
    • Stinson, D.R.1
  • 21
    • 0019572642 scopus 로고
    • New hash functions and their use in authentication and set equality
    • M.N. Wegman and J.L. Carter, New hash functions and their use in authentication and set equality, Journal of Computer and System Sciences 22(3) (1981) 265-279.
    • (1981) Journal of Computer and System Sciences , vol.22 , Issue.3 , pp. 265-279
    • Wegman, M.N.1    Carter, J.L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.