diff --git a/Bibliography.md b/Bibliography.md index e13fa39..5a62c90 100644 --- a/Bibliography.md +++ b/Bibliography.md @@ -21,6 +21,13 @@ Here are some papers that are potentially of interest. [Some thoughts on Collision Attacks in the Hash Functions MD5, SHA-0 and SHA-1](http://eprint.iacr.org/2005/391) general musings about design of secure hash functions +## Erasure Coding + + : A tutorial and some +software for erasure coding. This isn't the software that we use because it +isn't as fast as Rizzo's implementation, but the tutorial is nice. + + ## Local Filesystems [Model-Based Failure Analysis of Journaling File Systems](http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.78.8911) [PDF](http://www.cs.wisc.edu/wind/Publications/sfa-dsn05.pdf) compares ext3, reiserfs, and JFS under conditions of latent sector errors. (Impatient people: read the Introduction and look at the table on page 9.)