Cryptographic hash function

Results: 1121



#Item
241Error detection and correction / Information retrieval / Information science / Cryptographic hash functions / Hash function / Forwarding plane / Hash table / Traffic flow / Count-Min sketch / Hashing / Computing / Search algorithms

pics/optim-cmss-space-0.2-ss1.0.eps

Add to Reading List

Source URL: www-bcf.usc.edu

Language: English - Date: 2013-02-21 14:29:31
242Cultural history / Indicia / United States Postal Service / Postage meter / Postage stamp / Franking / Envelope / Hash function / Cryptographic hash function / Philately / Postal system / Terminology

Microstructure Based Indicia Joshua R. Smith Escher Laboratories 101 Main Street Cambridge, MA 02142

Add to Reading List

Source URL: sensor.cs.washington.edu

Language: English - Date: 2012-09-14 16:56:19
243Information science / Artificial intelligence / Hash table / Bloom filter / Hash function / Trie / Lookup table / Cryptographic hash function / Hash list / Hashing / Search algorithms / Information retrieval

Fast Hash Table Lookup Using Extended Bloom Filter: An Aid to Network Processing Haoyu Song Sarang Dharmapurikar Jonathan Turner John Lockwood l.e

Add to Reading List

Source URL: conferences.sigcomm.org

Language: English - Date: 2005-06-22 10:41:44
244Information retrieval / Information science / Universal hashing / Cuckoo hashing / Hash table / Hash function / Perfect hash function / Cryptographic hash function / SUHA / Hashing / Search algorithms / Artificial intelligence

6.897: Advanced Data Structures Spring 2005 Lecture 1 — February 1, 2005 Lecturer: Mihai Pˇ

Add to Reading List

Source URL: courses.csail.mit.edu

Language: English - Date: 2005-02-04 10:45:57
245Cryptographic protocols / Electronic commerce / Cryptographic hash function / Key / RSA / Hash function / Secret sharing / Password / Challenge-response authentication / Cryptography / Key management / Public-key cryptography

Environmental Key Generation towards Clueless Agents James Riordan? School of Mathematics University of Minnesota Minneapolis, MN 55455

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
246Skein / Threefish / Adder / Field-programmable gate array / Cryptographic hash function / Xilinx / Advanced Encryption Standard / ICE / Rotational cryptanalysis / Cryptography / Block ciphers / NIST hash function competition

Implementing Skein Hash Function on Xilinx Virtex-5 FPGA Platform Men Long, Intel Corporation, 02-Feb-09, VersionIntroduction

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:32
247Search algorithms / Computer performance / Software optimization / Cryptographic hash functions / Error detection and correction / Hash function / Trie / SHA-1 / Algorithm / Computing / Statistics / Computer programming

HyperLogLog in Practice: Algorithmic Engineering of a State of The Art Cardinality Estimation Algorithm Stefan Heule Marc Nunkesser

Add to Reading List

Source URL: stefanheule.com

Language: English - Date: 2015-01-15 03:04:25
248Replay attack / Public-key cryptography / Kerberos / Payment systems / Cryptography / Cryptographic hash function / Hashing

A Peer-to-Peer Software Metering System John Kelsey Bruce Schneier {kelsey,schneier}@counterpane.com Counterpane Systems, 101 East Minnehaha Parkway, Minneapolis, MN 55419

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
249Information science / Artificial intelligence / Hash function / Perfect hash function / Cryptographic hash function / Trie / Collision / Hash table / Linear probing / Hashing / Search algorithms / Information retrieval

HASH SORT: A LINEAR TIME COMPLEXITY MULITIPLE-DIMENSIONAL SORT ALGORITHM ORIGINALLY ENTITLED ”MAKING A HASH OF SORTS” ∗

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2008-02-01 14:49:02
250Cryptographic hash function / Information retrieval / Information science / Artificial intelligence / Hash / Hash functions / Hash table / Bloom filter / Hashing / Search algorithms / Error detection and correction

Perl versiondocumentation - Hash::Util NAME Hash::Util - A selection of general-utility hash subroutines SYNOPSIS

Add to Reading List

Source URL: perldoc.perl.org

Language: English - Date: 2014-10-03 14:56:23
UPDATE