Cryptographic hash function

Results: 1121



#Item
321Search algorithms / Randomness / Arithmetic / Rounding / Random number generation / Hash function / MD5 / Cryptographic hash function / Plot / Information / Data / Science

Frequency Tables Disclosure Control for the Abu Dhabi Census 2011 Hanan AlDarmaki and Miriam Hodge Statistics Centre – Abu Dhabi, Abu Dhabi, UAE Email: Abstract Statistics Centre-Abu

Add to Reading List

Source URL: www.statistics.gov.hk

Language: English - Date: 2013-08-22 04:39:17
322Error detection and correction / Key management / Digital signature / Cryptographic hash function / Hash function / Hash tree / RSA / Lamport signature / Merkle signature scheme / Cryptography / Public-key cryptography / Hashing

SPHINCS: practical stateless hash-based signatures Daniel J. Bernstein1,3 , Daira Hopwood2 , Andreas Hülsing3 , Tanja Lange3 , Ruben Niederhagen3 , Louiza Papachristodoulou4 , Michael Schneider,

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-09 11:36:42
323Computing / Hashing / Mathematics / Applied mathematics / Hash table / Hash function / Parallel computing / Algorithm / Collision / Cryptographic hash functions / Search algorithms / Cryptography

MOMENTUM - A MEMORY-HARD PROOF-OF-WORK VIA FINDING BIRTHDAY COLLISIONS DANIEL LARIMER Invictus Innovations, Inc ABSTRACT. We introduce the concept of memory-hard proof-of-work

Add to Reading List

Source URL: hashcash.org

Language: English - Date: 2014-01-13 13:07:17
324Error detection and correction / Search algorithms / Proof-of-work system / Lamport signature / Hash function / Hash tree / SHA-1 / Hash list / Trie / Cryptography / Cryptographic hash functions / Hashing

An (Almost) Constant-Effort Solution-Verification Proof-of-Work Protocol based on Merkle Trees (extended and colored version of [7]) Fabien Coelho ´ CRI, Ecole des mines de Paris,

Add to Reading List

Source URL: hashcash.org

Language: English - Date: 2008-06-22 07:14:34
325Hashing / MD5 / HMAC / SHA-2 / Collision attack / SHA-1 / Crypt / Merkle–Damgård construction / Hash function / Error detection and correction / Cryptographic hash functions / Cryptography

CIS 331 Introduction to Networks & Security January 23, 2014 Project 1: Attacking Cryptographic Hashes

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2014-11-18 15:19:13
326Key management / /dev/random / Unix / Random number generation / Cryptographic hash function / Entropy / Padding / Pseudorandomness / Fortuna / Cryptography / Randomness / Pseudorandom number generators

The following paper was originally published in the Proceedings of the 7th USENIX Security Symposium San Antonio, Texas, January 26-29, 1998 Software Generation of Practically Strong Random Numbers

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2002-04-30 18:06:39
327Computing / Hashing / Mathematics / Applied mathematics / Hash table / Hash function / Parallel computing / Algorithm / Collision / Cryptographic hash functions / Search algorithms / Cryptography

MOMENTUM - A MEMORY-HARD PROOF-OF-WORK VIA FINDING BIRTHDAY COLLISIONS DANIEL LARIMER Invictus Innovations, Inc ABSTRACT. We introduce the concept of memory-hard proof-of-work

Add to Reading List

Source URL: www.hashcash.org

Language: English - Date: 2014-01-13 13:07:17
328Hashing / Computing / Software / Bitcoin / Peer-to-peer computing / Hash tree / Hash list / Hash function / Cryptographic nonce / Cryptography / Error detection and correction / Cryptographic hash functions

Bitcoin: A Peer-to-Peer Electronic Cash System Satoshi Nakamoto www.bitcoin.org Abstract. A purely peer-to-peer version of electronic cash would allow online

Add to Reading List

Source URL: www.weusecoins.com

Language: English - Date: 2015-04-20 01:14:27
329Biometrics / Fingerprints / Search algorithms / Error detection and correction / Rabin fingerprint / Public key fingerprint / Hash function / Cryptographic hash function / SHA-1 / Cryptography / Information science / Information

WWWTrack: Data Mining Session: Similarity Search Detecting Near-Duplicates for Web Crawling Arvind Jain

Add to Reading List

Source URL: www2007.org

Language: English - Date: 2007-04-04 20:19:55
330Computer security / MS-CHAP / LM hash / Point-to-Point Tunneling Protocol / Password / Authentication protocol / Challenge-response authentication / NTLM / Cryptographic hash function / Cryptography / Computing / Internet protocols

Cryptanalysis of Microsoft’s PPTP Authentication Extensions (MS-CHAPv2) Bruce Schneier Mudge Counterpane Systems L0pht Heavy Industries

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
UPDATE