<--- Back to Details
First PageDocument Content
Computing / Information science / Information retrieval / Hashing / Data types / Filter theory / Search algorithms / Bloom filter / Digital signal processing / Streaming algorithm / Hash function / Set
Date: 2018-10-11 06:03:09
Computing
Information science
Information retrieval
Hashing
Data types
Filter theory
Search algorithms
Bloom filter
Digital signal processing
Streaming algorithm
Hash function
Set

Advanced Topics in Communication Networks Programming Network Data Planes Last week on Advanced Topics in Communication Networks

Add to Reading List

Source URL: adv-net.ethz.ch

Download Document from Source Website

File Size: 1,90 MB

Share Document on Facebook

Similar Documents

Time-memory Trade-offs for Near-collisions Ga¨etan Leurent UCL Crypto Group   Abstract. In this work we consider generic algorithms to find nearcollisions for a hash function. If we consider o

Time-memory Trade-offs for Near-collisions Ga¨etan Leurent UCL Crypto Group Abstract. In this work we consider generic algorithms to find nearcollisions for a hash function. If we consider o

DocID: 1xTVd - View Document

The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function Jian Guo1 , J´er´emy Jean1 , Ga¨etan Leurent2 , Thomas Peyrin1 , and Lei Wang1 1

The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function Jian Guo1 , J´er´emy Jean1 , Ga¨etan Leurent2 , Thomas Peyrin1 , and Lei Wang1 1

DocID: 1xT7a - View Document

The Skein Hash Function Family Version 1.3 — 1 Oct 2010 Niels Ferguson Stefan Lucks Bruce Schneier

The Skein Hash Function Family Version 1.3 — 1 Oct 2010 Niels Ferguson Stefan Lucks Bruce Schneier

DocID: 1tn3m - View Document

On the design and cryptanalysis of a one-way hash Carl Ellison Victor Miller Eran Tromer Rebecca Wright In this paper we describe a novel one-way hash function that is compliant with the NIST hash function competition dr

On the design and cryptanalysis of a one-way hash Carl Ellison Victor Miller Eran Tromer Rebecca Wright In this paper we describe a novel one-way hash function that is compliant with the NIST hash function competition dr

DocID: 1t9VA - View Document

Appears in Fast Software Encryption(FSE 2004), Lecture Notes in Computer Science, Vol. ????, Springer-Verlag. This is the full version. Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for P

Appears in Fast Software Encryption(FSE 2004), Lecture Notes in Computer Science, Vol. ????, Springer-Verlag. This is the full version. Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for P

DocID: 1rEjw - View Document