Cryptographic hash function

Results: 1121



#Item
151BitTorrent / Peer-to-peer / Computing / Cryptographic hash functions / Distribution / Hash function / Hash list / Mathematics / EigenTrust / File sharing networks / Error detection and correction / Mathematical analysis

Stochastic Analysis of A Randomized Detection Algorithm for Pollution Attack in P2P Live Streaming Systems Yongkun Li John C.S. Lui The Chinese University of Hong Kong

Add to Reading List

Source URL: www.cs.cuhk.hk

Language: English - Date: 2011-07-14 21:00:42
152Secure communication / Transport Layer Security / Symmetric-key algorithm / RC4 / Block cipher modes of operation / Stream cipher / Ciphertext / Padding / Cryptographic hash function / Cryptography / Cryptographic protocols / Internet protocols

1 SSL, TLS, and Cryptography We live in an increasingly connected world. During the last decade of the 20th century the Internet rose to popularity and forever changed how we live our lives. Today we rely on our phones a

Add to Reading List

Source URL: sslmate.com

Language: English - Date: 2015-06-06 19:18:36
153Search algorithms / Computing / Information retrieval / Artificial intelligence / Cryptography / Hash function / Online codes / Hash list / Hash tree / Cryptographic hash functions / Error detection and correction / Hashing

PDF Document

Add to Reading List

Source URL: coralcdn.org

Language: English - Date: 2004-03-19 09:39:34
154Combinatorics / Cryptography / Search algorithms / Applied mathematics / SHA-2 / Theoretical computer science / Permutation / Hash function / Independence / Mathematics / Cryptographic hash functions / Hashing

i A random zoo: sloth, un∨corn, and trx Arjen K. Lenstra and Benjamin Wesolowski EPFL IC LACAL, Station 14, CH-1015 Lausanne, Switzerland Abstract. Many applications require trustworthy generation of public random num

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-22 06:51:37
155MD5 / Search algorithms / Collision attack / MD4 / Hash function / Merkle–Damgård construction / Preimage attack / Crypt / SHA-1 / Cryptography / Cryptographic hash functions / Hashing

An algorithm for MD5 single-block collision attack using high-performance computing cluster

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-11-07 01:57:01
156Cryptography / Search algorithms / Database theory / Tamper-evident / Database security / Forensic science / Mass spectrometry software / Cryptographic hash function / Hash function / Science / Packaging / Security

D RAGOON: An Information Accountability System for High-Performance Databases Kyriacos E. Pavlou 1 and Richard T. Snodgrass 2 Department of Computer Science, The University of Arizona P.O. Box, Tucson, AZ 85721–

Add to Reading List

Source URL: www.cs.arizona.edu

Language: English - Date: 2012-03-18 19:10:26
157Artificial intelligence / Cryptography / Hash table / Information science / Hash function / Hash chain / Cryptographic hash functions / Search algorithms / Hashing / Information retrieval

Forensic Analysis of Database Tampering Kyriacos Pavlou Richard T. Snodgrass Department of Computer Science

Add to Reading List

Source URL: www.cs.arizona.edu

Language: English - Date: 2007-09-24 16:43:05
158Cryptographic protocols / Elliptic curve Diffie–Hellman / Diffie–Hellman key exchange / SHA-1 / SHA-2 / Elliptic Curve DSA / Key derivation function / Key / CRYPTREC / Cryptography / Cryptographic hash functions / Key management

Japan Cryptographic Module Validation Program(JCMVP) Specifications of Cryptographic Algorithm Implementation Testing — Key Establishment Schemes —

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-05-28 08:17:39
159Search algorithms / Cryptography / Academia / Knowledge / Neil Gershenfeld / Year of birth missing / Hash function / Doctorate / Professor / Hashing / Education / Cryptographic hash functions

1 Physical One-Way Functions by Pappu Srinivasa Ravikanth

Add to Reading List

Source URL: www.cba.mit.edu

Language: English - Date: 2011-12-13 18:32:03
160Transmission Control Protocol / Data transmission / Network performance / Computing / Communications protocol / Initialization vector / Throughput / Network packet / Cryptographic hash function / Information / Cryptography / Data

Selective Jamming Attacks in Wireless Networks Alejandro Proa˜no Loukas Lazos Dept. of Electrical and Computer Engineering

Add to Reading List

Source URL: www2.engr.arizona.edu

Language: English - Date: 2010-02-05 14:49:04
UPDATE