Cryptographic hash function

Results: 1121



#Item
51CPSCExam 2 // December 1, 2011 Answer all of the questions. Please remember to write your name, the course number, and today’s date on all blue books that you submit. This is a closed-book exam; please do n

CPSCExam 2 // December 1, 2011 Answer all of the questions. Please remember to write your name, the course number, and today’s date on all blue books that you submit. This is a closed-book exam; please do n

Add to Reading List

Source URL: zoo.cs.yale.edu

Language: English - Date: 2011-12-12 14:53:47
52Multiple Aggregations Over Data Streams Rui Zhang† Nick Koudas‡  Beng Chin Ooi†

Multiple Aggregations Over Data Streams Rui Zhang† Nick Koudas‡ Beng Chin Ooi†

Add to Reading List

Source URL: www.comp.nus.edu.sg

Language: English - Date: 2005-06-07 05:36:19
53SPV: Secure Path Vector Routing for Securing BGP  ∗ Yih-Chun Hu Adrian Perrig

SPV: Secure Path Vector Routing for Securing BGP ∗ Yih-Chun Hu Adrian Perrig

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English - Date: 2015-06-01 09:06:13
54Nordic Collegiate Programming Contest NCPC 2007 October 6th, 2007 The Problemset A B

Nordic Collegiate Programming Contest NCPC 2007 October 6th, 2007 The Problemset A B

Add to Reading List

Source URL: ncpc.idi.ntnu.no

Language: English - Date: 2014-01-20 12:10:57
55Bipartite Biotokens: Definition, Implementation, and Analysis W.J. Scheirer2,1,† and T.E. Boult1,2,†,? 1  Univ. of Colorado at Colorado Springs, Colorado Springs, CO

Bipartite Biotokens: Definition, Implementation, and Analysis W.J. Scheirer2,1,† and T.E. Boult1,2,†,? 1 Univ. of Colorado at Colorado Springs, Colorado Springs, CO

Add to Reading List

Source URL: www.vast.uccs.edu

Language: English - Date: 2010-10-23 12:03:49
56Bitcoin: A Peer-to-Peer Electronic Cash System Satoshi Nakamoto  www.bitcoin.org  Abstract. A purely peer-to-peer version of electronic cash would allow online

Bitcoin: A Peer-to-Peer Electronic Cash System Satoshi Nakamoto www.bitcoin.org Abstract. A purely peer-to-peer version of electronic cash would allow online

Add to Reading List

Source URL: www.dcg.ethz.ch

Language: English - Date: 2014-09-26 08:28:56
57Proving Security of Tor’s Hidden Service Identity Blinding Protocol Tor Project Tech ReportNicholas Hopper  1

Proving Security of Tor’s Hidden Service Identity Blinding Protocol Tor Project Tech ReportNicholas Hopper 1

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2013-12-12 23:20:54
58Low-Cost SHA-1 Hash Function Architecture for RFID Tags M. O’Neill (nee McLoone) Institute of Electronics, Communications, and Information Technology (ECIT) Queen’s University Belfast, Northern Ireland

Low-Cost SHA-1 Hash Function Architecture for RFID Tags M. O’Neill (nee McLoone) Institute of Electronics, Communications, and Information Technology (ECIT) Queen’s University Belfast, Northern Ireland

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2008-07-21 05:29:13
59Michał Nowotka1, Anne Hersey1 [1] European Molecular Biology Laboratory - European Bioinformatics Institute Email:  Locality Sensitive Hashing for compound similarity search.

Michał Nowotka1, Anne Hersey1 [1] European Molecular Biology Laboratory - European Bioinformatics Institute Email: Locality Sensitive Hashing for compound similarity search.

Add to Reading List

Source URL: cisrg.shef.ac.uk

Language: English - Date: 2016-07-11 09:58:32
60CRYPTANALYSIS OF A HASH FUNCTION BASED ON NORM FORM EQUATIONS JEAN-PHILIPPE AUMASSON Abstract. The cryptographic hash function Codefish is an outcome of a research project led by the company KRIPTO Research and the Unive

CRYPTANALYSIS OF A HASH FUNCTION BASED ON NORM FORM EQUATIONS JEAN-PHILIPPE AUMASSON Abstract. The cryptographic hash function Codefish is an outcome of a research project led by the company KRIPTO Research and the Unive

Add to Reading List

Source URL: 131002.net

Language: English - Date: 2012-08-14 06:46:45