New Hash Functions and Their Use in Authentication and Set Equality
暂无分享,去创建一个
[1] Gilles Brassard,et al. Relativized cryptography , 1979, 20th Annual Symposium on Foundations of Computer Science (sfcs 1979).
[2] Ronald Fagin,et al. Extendible hashing—a fast access method for dynamic files , 1979, ACM Trans. Database Syst..
[3] Andrew Chi-Chih Yao,et al. Some complexity questions related to distributive computing(Preliminary Report) , 1979, STOC.
[4] Larry Carter,et al. Universal Classes of Hash Functions , 1979, J. Comput. Syst. Sci..
[5] Viiveke Fåk. Repeated use of codes which detect deception (Corresp.) , 1979, IEEE Trans. Inf. Theory.
[6] Larry Carter,et al. Exact and approximate membership testers , 1978, STOC.
[7] Adi Shamir,et al. On Digital Signatures and Public-Key Cryptosystems. , 1977 .
[8] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[9] F. MacWilliams,et al. Codes which detect deception , 1974 .