Cryptographic hash function

Results: 1121



#Item
471Electronic commerce / Hidden Field Equations / RSA / QUAD / Key / Cryptographic hash function / Polynomial / Cryptography / Public-key cryptography / Post-quantum cryptography

Multivariate Quadratic Hash Jintai Ding*, Bo-yin Yang** University of Cincinnati* Technical University of Darmstadt* Institute of Information Science, Academia Sinica**

Add to Reading List

Source URL: www.fields.utoronto.ca

Language: English - Date: 2006-12-04 11:51:29
472Routing / Link-state routing protocol / Destination-Sequenced Distance Vector routing / Distance-vector routing protocol / Hash chain / Cryptographic hash function / Path vector protocol / Enhanced Interior Gateway Routing Protocol / Interior gateway protocol / Routing protocols / Network architecture / Computing

Efficient Security Mechanisms for Routing Protocols Yih-Chun Hu Carnegie Mellon University [removed] Adrian Perrig

Add to Reading List

Source URL: users.crhc.illinois.edu

Language: English - Date: 2003-02-20 14:25:57
473Hashing / Computing / Software / Bitcoin / Peer-to-peer computing / Hash tree / Hash list / Hash function / Cryptographic nonce / Cryptography / Error detection and correction / Cryptographic hash functions

Bitcoin: A Peer-to-Peer Electronic Cash System Satoshi Nakamoto [removed] www.bitcoin.org Abstract. A purely peer-to-peer version of electronic cash would allow online

Add to Reading List

Source URL: www.organicdesign.co.nz

Language: English - Date: 2011-06-18 04:34:18
474Routing / Link-state routing protocol / Destination-Sequenced Distance Vector routing / Distance-vector routing protocol / Hash chain / Cryptographic hash function / Path vector protocol / Enhanced Interior Gateway Routing Protocol / Interior gateway protocol / Routing protocols / Network architecture / Computing

Efficient Security Mechanisms for Routing Protocols Yih-Chun Hu Carnegie Mellon University [removed] Adrian Perrig

Add to Reading List

Source URL: monarch.cs.rice.edu

Language: English - Date: 2003-02-20 14:25:57
475Mathematics / Search algorithms / Multiset / Hash function / Collision resistance / MD5 / SHA-1 / Collision / Provably secure cryptographic hash function / Cryptographic hash functions / Cryptography / Hashing

Incremental Multiset Hash Functions and Their Application to Memory Integrity Checking Dwaine Clarke? , Srinivas Devadas, Marten van Dijk?? , Blaise Gassend, G. Edward Suh MIT Computer Science and Artificial Intelligence

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
476Cryptography / Data management / Cryptographic hash functions / Error detection and correction / Checksum / Hash list / Inode / File system / Hash function / Computing / Disk file systems / Hashing

Enhancing File System Integrity Through Checksums Gopalan Sivathanu, Charles P. Wright, and Erez Zadok Stony Brook University Technical Report FSL-04-04

Add to Reading List

Source URL: www.fsl.cs.sunysb.edu

Language: English - Date: 2012-09-07 11:07:01
477Information retrieval / Hash function / Hash table / Locality-sensitive hashing / Image retrieval / Tf*idf / Cryptographic hash function / Histogram / Query expansion / Information science / Search algorithms / Artificial intelligence

Near Duplicate Image Detection: min-Hash and tf-idf Weighting Ondˇrej Chum1 1 CMP, James Philbin2

Add to Reading List

Source URL: www.robots.ox.ac.uk

Language: English - Date: 2008-07-25 10:15:10
478Cryptography / Internet privacy / Public-key cryptography / Privacy / Recall / Cryptographic hash function / Radio-frequency identification / Ethics / Technology / Ethology

Total Recall: Are Privacy Changes Inevitable? ∗ [ appeared in CARPE 2004 ]

Add to Reading List

Source URL: bourbon.usc.edu

Language: English - Date: 2004-08-20 15:45:36
479Routing / Link-state routing protocol / Destination-Sequenced Distance Vector routing / Distance-vector routing protocol / Hash chain / Cryptographic hash function / Path vector protocol / Enhanced Interior Gateway Routing Protocol / Interior gateway protocol / Routing protocols / Network architecture / Computing

Efficient Security Mechanisms for Routing Protocols Yih-Chun Hu Carnegie Mellon University [removed] Adrian Perrig

Add to Reading List

Source URL: www.monarch.cs.rice.edu

Language: English - Date: 2003-02-20 14:25:57
480Information retrieval / Artificial intelligence / Hash table / Linear hashing / Hash function / Extendible hashing / Trie / Bucket sort / Cryptographic hash function / Hashing / Search algorithms / Information science

Split-Ordered Lists: Lock-Free Extensible Hash Tables ORI SHALEV Tel-Aviv University, Tel-Aviv, Israel AND NIR SHAVIT

Add to Reading List

Source URL: www.cs.tau.ac.il

Language: English - Date: 2007-02-14 07:20:54
UPDATE