Cryptographic hash function

Results: 1121



#Item
421Hashing / MD5 / Merkle–Damgård construction / Hash function / Preimage attack / Collision / Crypt / One-way compression function / Tiger / Cryptography / Cryptographic hash functions / Error detection and correction

Collisions in MD5 Antoine Delignat-Lavaud Collisions in MD5 ... and how to use them for fun and profit.

Add to Reading List

Source URL: antoine.delignat-lavaud.fr

Language: English - Date: 2010-08-17 15:48:58
422Information science / Artificial intelligence / Hash table / Hash function / Bin / Cryptographic hash function / Collision / Associative array / Bloom filter / Search algorithms / Hashing / Information retrieval

Multiple Aggregations Over Data Streams Rui Zhang† Nick Koudas‡ Beng Chin Ooi†

Add to Reading List

Source URL: www.ruizhang.info

Language: English - Date: 2005-06-07 05:21:04
423Search algorithms / Cryptography / Academia / Knowledge / Neil Gershenfeld / Year of birth missing / Hash function / Doctorate / Professor / Hashing / Education / Cryptographic hash functions

1 Physical One-Way Functions by Pappu Srinivasa Ravikanth

Add to Reading List

Source URL: cba.mit.edu

Language: English - Date: 2011-12-13 18:32:03
424Information retrieval / Information science / Artificial intelligence / Error detection and correction / Hash function / Hash table / Collision / Bin / Query optimizer / Hashing / Search algorithms / Cryptographic hash functions

Noname manuscript No. (will be inserted by the editor) Streaming Multiple Aggregations Using Phantoms Rui Zhang · Nick Koudas · Beng Chin Ooi · Divesh Srivastava · Pu Zhou

Add to Reading List

Source URL: www.ruizhang.info

Language: English - Date: 2010-02-03 20:09:19
425Information science / Information retrieval / Artificial intelligence / Hash table / Cryptographic hash functions / Hash function / Trie / CPU cache / Hash list / Search algorithms / Hashing / Error detection and correction

CITI Technical Report 00-1 Linux Kernel Hash Table Behavior: Analysis and Improvements Chuck Lever, Sun-Netscape Alliance

Add to Reading List

Source URL: www.citi.umich.edu

Language: English - Date: 2000-05-03 13:54:06
426Cryptographic software / Key / Cryptographic hash function / SHA-2 / Digital signature / Key generation / Network Security Services / Cryptography / Key management / Public-key cryptography

Digital Certificate From 1024 to 2048 Insert Your Kenny Lai Name

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2013-01-09 01:36:33
427Cryptographic software / Key / Cryptographic hash function / SHA-2 / Digital signature / Key generation / Network Security Services / Cryptography / Key management / Public-key cryptography

Digital Certificate From 1024 to 2048 Insert Your Kenny Lai Name

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2013-01-09 01:36:33
428Internet protocols / Cryptographic protocols / Internet standards / Hashing / Computer network security / Kerberos / HMAC / Hash function / Transmission Control Protocol / Computing / Cryptography / Data

The KX.509 Protocol William Doster Marcus Watts Dan Hyde University of Michigan

Add to Reading List

Source URL: www.citi.umich.edu

Language: English - Date: 2001-09-26 12:44:24
429Cryptographic hash function / Path / Password / Computing / File system / File

Microsoft Word - VEOToolkitSpecification-AW[removed]doc

Add to Reading List

Source URL: prov.vic.gov.au

Language: English - Date: 2014-08-08 00:51:00
430Cryptographic software / Key / Cryptographic hash function / SHA-2 / Digital signature / Key generation / Network Security Services / Cryptography / Key management / Public-key cryptography

Digital Certificate From 1024 to 2048 Insert Your Kenny Lai Name

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2013-01-09 01:36:34
UPDATE