New hash functions and their use in authentication and set equality
- 1 June 1981
- journal article
- Published by Elsevier in Journal of Computer and System Sciences
- Vol. 22 (3) , 265-279
- https://doi.org/10.1016/0022-0000(81)90033-7
Abstract
No abstract availableKeywords
This publication has 7 references indexed in Scilit:
- Extendible hashing—a fast access method for dynamic filesACM Transactions on Database Systems, 1979
- Universal classes of hash functionsJournal of Computer and System Sciences, 1979
- Repeated use of codes which detect deception (Corresp.)IEEE Transactions on Information Theory, 1979
- Cutaneous PseudolymphomaThe Journal of Dermatologic Surgery and Oncology, 1978
- On taking roots in finite fieldsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1977
- New directions in cryptographyIEEE Transactions on Information Theory, 1976
- Vanadium Oxytrichloride Oxidation of Reticuline to Isoboldine1Synthetic Communications, 1973