OPTIMALITY PROPERTIES OF MULTIPLE-KEY HASHING FUNCTIONS.

被引:0
|
作者
Bolour, Azad
机构
来源
| 1600年 / 26期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [1] OPTIMALITY PROPERTIES OF MULTIPLE-KEY HASHING FUNCTIONS
    BOLOUR, A
    JOURNAL OF THE ACM, 1979, 26 (02) : 196 - 210
  • [2] AN ENCODING MULTIPLE-KEY RESPONSE UNIT
    CORWIN, TR
    BEATY, WJ
    BEHAVIOR RESEARCH METHODS INSTRUMENTS & COMPUTERS, 1985, 17 (04): : 474 - 475
  • [3] OPTIMALITY PROPERTIES OF THE DISK MODULO ALLOCATION METHOD FOR K-ARY MULTIPLE KEY HASHING FILES
    CHANG, CC
    LIN, HF
    CHEN, CY
    COMPUTER JOURNAL, 1992, 35 (04) : 390 - 394
  • [4] Improved authenticated multiple-key agreement protocol
    Yen, SM
    Joye, M
    ELECTRONICS LETTERS, 1998, 34 (18) : 1738 - 1739
  • [5] Security of authenticated multiple-key agreement protocols
    Wu, TS
    He, WH
    Hsu, CL
    ELECTRONICS LETTERS, 1999, 35 (05) : 391 - 392
  • [6] FAST ALGORITHM FOR CONSTRUCTING RECIPROCAL HASHING FUNCTIONS.
    Chang, C.C.
    Shieh, J.C.
    1985, : 232 - 236
  • [7] Improved authenticated multiple-key agreement protocol
    Yeh, HT
    Sun, HM
    Hwang, T
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2003, 46 (2-3) : 207 - 211
  • [8] Vulnerability of two multiple-key agreement protocols
    Farash, Mohammad Sabzinejad
    Bayat, Majid
    Attari, Mahmoud Ahmadian
    COMPUTERS & ELECTRICAL ENGINEERING, 2011, 37 (02) : 199 - 204
  • [9] ON THE DESIGN OF LETTER-ORIENTED MINIMAL PERFECT HASHING FUNCTIONS.
    Chang, Chin-Chen
    Shieh, Jiann-Cherng
    1985, (08):
  • [10] The n-Diffie-Hellman problem and multiple-key encryption
    Chen, Liqun
    Chen, Yu
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2012, 11 (05) : 305 - 320