First Page | Document Content | |
---|---|---|
![]() Date: 2006-02-18 13:57:44Preimage attack Collision attack SHA-1 MD5 SHA-2 Collision resistance Tiger Hash function Hash tree Cryptographic hash functions Cryptography Error detection and correction | Source URL: eprint.iacr.orgDownload Document from Source WebsiteFile Size: 304,08 KBShare Document on Facebook |
![]() | Cooperative XPath Caching Kostas Lillis and Evaggelia Pitoura Computer Science Department University of Ioannina, Greece {klillis,DocID: 1rqvV - View Document |
![]() | The Architecture of PIER: an Internet-Scale Query Processor Ryan Huebsch, Brent Chun, Joseph M. Hellerstein, Boon Thau Loo, Petros Maniatis, Timothy Roscoe, Scott Shenker, Ion Stoica and Aydan R. Yumerefendi UC BerkeleyDocID: 1r0TY - View Document |
![]() | Microsoft Word - article4.docDocID: 1qZW6 - View Document |
![]() | BATON: A Balanced Tree Structure for Peer-to-Peer Networks H.V. Jagadish 1,2DocID: 1qq4a - View Document |
![]() | 1242 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 17,DocID: 1qadb - View Document |