Next: About this document ...
Up: An Analysis of Compare-by-hash
Previous: Acknowledgments
- 1
-
Bitmover, Inc.
Bitkeeper - the scalable distributed software configuration
management system.
https://www.bitkeeper.com.
- 2
-
Florent Chabuad and Antoine Joux.
Differential collisions in SHA-0.
In Proceedings of CRYPTO '98, 18th Annual International
Cryptology Conference, pages 56-71, 1998.
- 3
-
Landon P. Cox, Christoper D. Murray, and Brian D. Noble.
Pastiche: Making backup cheap and easy.
In Proceedings of the 5th Symposium on Operating Systems Design
and Implementation, 2002.
- 4
-
Athicha Muthitacharoen, Benjie Chen, and David Maziéres.
A low-bandwidth network file system.
In Proceedings of the 18th ACM Symposium on Operating Systems
Principles, 2001.
- 5
-
National Institute of Standards and Technology.
FIPS Publication 180-1: Secure Hash Standard, 1995.
- 6
-
Sean Quinlan and Sean Dorward.
Venti: a new approach to archival storage.
In Proceedings of the FAST 2002 Conference on File and Storage
Technologies, 2002.
- 7
-
M. O. Rabin.
Fingerprinting by random polynomials.
Technical Report TR-15-81, Center for Research in Computer
Technology, Harvard University, 1981.
- 8
-
B. Van Rompay, B. Preneel, and J. Vandewalle.
On the security of dedicated hash functions.
In 19th Symposium on Information Theory in the Benelux, 1998.
- 9
-
Constantine P. Sapuntzakis, Ramesh Chandra, Ben Pfaff, Jim Chow, Monica S. Lam,
and Mendel Rosenblum.
Optimizing the migration of virtual computers.
In Proceedings of the 5th Symposium on Operating Systems Design
and Implementation, 2002.
- 10
-
Bruce Schneier.
Applied Cryptography.
John Wiley & Sons, Inc., second edition, 1996.
- 11
-
Jonathan S. Shapiro and John Vanderburgh.
CPCMS: A configuration management system based on cryptographic
names.
In Proceedings of the 2002 USENIX Technical Conference,
FREENIX Track, 2002.
- 12
-
Neil T. Spring and David Wetherall.
A protocol independent technique for eliminating redundant network
traffic.
In Proceedings of the 2000 ACM SIGCOMM Conference, 2000.
- 13
-
Jonathan Stone and Craig Partridge.
When the CRC and TCP checksum disagree.
In Proceedings of the 2000 ACM SIGCOMM Conference, 2000.
- 14
-
Andrew Tridgell.
Efficient Algorithms for Sorting and Synchronization.
PhD thesis, The Australian National University, 1999.
2003-06-16