Cryptographic hash function

Results: 1121



#Item
361Password / Cryptography / Cryptographic protocols / Usability / QR code / Bluetooth / Cryptographic hash function / Transport Layer Security / Mobile payment / Technology / Electronic commerce / Computing

Usability and Security of Out-Of-Band Channels in Secure Device Pairing Protocols Ronald Kainda Ivan Flechais

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2009-06-18 19:45:58
362Randomness / Key management / Fortuna / ISAAC / Linear congruential generator / Cryptographic hash function / Random number generation / Mersenne twister / Advanced Encryption Standard / Cryptography / Pseudorandom number generators / Stream ciphers

Parallel Random Numbers: As Easy as 1, 2, 3 ∗ ∗† John K. Salmon, Mark A. Moraes, Ron O. Dror, and David E. Shaw

Add to Reading List

Source URL: www.thesalmons.org

Language: English - Date: 2011-10-02 11:06:07
363MD4 / SHA-2 / SHA-1 / RIPEMD / MD5 / Hash function / Keccak / MD2 / Crypt / Error detection and correction / Cryptographic hash functions / Cryptography

CA642: C RYPTOGRAPHY AND N UMBER T HEORY 8 1

Add to Reading List

Source URL: www.computing.dcu.ie

Language: English - Date: 2014-10-30 10:52:49
364Computing / Cryptographic hash functions / Information retrieval / Information science / Hash function / Database / Hash list / Email / Error detection and correction / Hashing / Search algorithms

ABOUT goTrace is developed by United Nations Office on Drugs and Crime (UNODC). The United Kingdom provided the goTrace Project with seed funding in[removed]This has allowed a prototype to be developed and offered for tri

Add to Reading List

Source URL: www.imolin.org

Language: English - Date: 2015-03-20 06:35:24
365Information science / Artificial intelligence / Error detection and correction / Hash functions / Hash table / Cryptographic hash functions / Trie / Linked list / Perfect hash function / Hashing / Search algorithms / Information retrieval

VISUAL BASIC COLLECTIONS AND HASH TABLES Thomas Niemann Preface

Add to Reading List

Source URL: www.epaperpress.com

Language: English - Date: 2014-07-10 21:19:43
366Information science / Artificial intelligence / Hash table / Hash function / Cryptographic hash function / Trie / Linear probing / Hash list / Rabin–Karp algorithm / Hashing / Search algorithms / Information retrieval

APPROXIMATE MULTIPLE STRING SEARCH Robert Muth and Udi Manber1 Department of Computer Science University of Arizona Tucson, AZ 85721 {muth | udi}@cs.arizona.edu

Add to Reading List

Source URL: webglimpse.net

Language: English - Date: 2002-10-23 23:03:02
367Computing / Data structures / Tree traversal / Hashing / Merkle signature scheme / Tree / B-tree / Cryptographic hash function / R-tree / Binary trees / Cryptography / Graph theory

Structural Signatures for Tree Data Structures Ashish Kundu Elisa Bertino Department of Computer Science, Purdue

Add to Reading List

Source URL: www.vldb.org

Language: English - Date: 2008-10-22 09:22:53
368Cryptographic hash functions / Permutations / NIST hash function competition / Grøstl / Combinatorics / Advanced Encryption Standard / Block cipher / SHA-1 / SHA-2 / Cryptography / Mathematics / Error detection and correction

Improved Cryptanalysis of AES-like Permutations Jérémy Jean1 , María Naya-Plasencia2 , and Thomas Peyrin3 École Normale Supérieure, France INRIA Paris-Rocquencourt, France Nanyang Technological University, Singapore

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-24 06:21:47
369Artificial intelligence / Information retrieval / Bloom filter / Hash function / Cryptographic hash functions / Hash table / Password / Rainbow table / Password strength / Search algorithms / Hashing / Cryptography

An Algorithm for Approximate Membership Checking With Application to Password Security Udi Manber1 and Sun Wu Department of Computer Science University of Arizona

Add to Reading List

Source URL: webglimpse.net

Language: English - Date: 2002-10-23 23:03:02
370Chemical nomenclature / Identifiers / Encodings / International Chemical Identifier / Computational chemistry / Chemical table file / InChI Trust / Cryptographic hash function / VE / Chemistry / Science / Cheminformatics

IUPAC International Chemical Identifier (InChI) Programs InChI version 1, software version[removed]September[removed]User’s Guide Last revision date: September 12, 2011

Add to Reading List

Source URL: www.inchi-trust.org

Language: English - Date: 2014-10-20 03:20:55
UPDATE