Next:
Abstract
An Analysis of Compare-by-hash
Val Henson
Sun Microsystems
vhenson@eng.sun.com
Abstract
Introduction
Traditional applications of hashing
Compare-by-hash in detail
Questions about compare-by-hash
Randomness of input
Cryptographic hashes -- one size fits all?
Silent, deterministic, hard-to-fix errors
Comparing probabilities
Software and reliability
When is compare-by-hash appropriate?
Alternatives to compare-by-hash
Non-alternatives to compare-by-hash
Existence proof: Rsync vs. BitKeeper
Conclusion
Acknowledgments
Bibliography
About this document ...
2003-06-16