New Hash Functions and Their Use in Authentication and Set Equality

[1]  Gilles Brassard,et al.  Relativized cryptography , 1979, 20th Annual Symposium on Foundations of Computer Science (sfcs 1979).

[2]  Ronald Fagin,et al.  Extendible hashing—a fast access method for dynamic files , 1979, ACM Trans. Database Syst..

[3]  Andrew Chi-Chih Yao,et al.  Some complexity questions related to distributive computing(Preliminary Report) , 1979, STOC.

[4]  Larry Carter,et al.  Universal Classes of Hash Functions , 1979, J. Comput. Syst. Sci..

[5]  Viiveke Fåk Repeated use of codes which detect deception (Corresp.) , 1979, IEEE Trans. Inf. Theory.

[6]  Larry Carter,et al.  Exact and approximate membership testers , 1978, STOC.

[7]  Adi Shamir,et al.  On Digital Signatures and Public-Key Cryptosystems. , 1977 .

[8]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[9]  F. MacWilliams,et al.  Codes which detect deception , 1974 .