Cryptographic hash function

Results: 1121



#Item
51Electronic documents / Cross-platform software / Gmail / Webmail / Internet privacy / Hashcash / Privacy / Information privacy / Bitcoin / Cryptographic hash function / Digital signature / Email

CPSCExam 2 // December 1, 2011 Answer all of the questions. Please remember to write your name, the course number, and today’s date on all blue books that you submit. This is a closed-book exam; please do n

Add to Reading List

Source URL: zoo.cs.yale.edu

Language: English - Date: 2011-12-12 14:53:47
52Search algorithms / Hashing / Hash table / Hash function / Cryptographic hash function / Bin / Trie / Bloom filter / Locality-sensitive hashing

Multiple Aggregations Over Data Streams Rui Zhang† Nick Koudas‡ Beng Chin Ooi†

Add to Reading List

Source URL: www.comp.nus.edu.sg

Language: English - Date: 2005-06-07 05:36:19
53Routing protocols / Public-key cryptography / Hashing / Cryptography / Key management / Border Gateway Protocol / Cryptographic hash function / Hash chain / Merkle tree / RSA / Man-in-the-middle attack / Autonomous system

SPV: Secure Path Vector Routing for Securing BGP ∗ Yih-Chun Hu Adrian Perrig

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English - Date: 2015-06-01 09:06:13
54Search algorithms / Hashing / Hash function / Hash table / Cuckoo hashing / Cryptographic hash function / Birthday problem / Feature hashing / Tabulation hashing

Nordic Collegiate Programming Contest NCPC 2007 October 6th, 2007 The Problemset A B

Add to Reading List

Source URL: ncpc.idi.ntnu.no

Language: English - Date: 2014-01-20 12:10:57
55Biometrics / Cryptography / Coding theory / Fuzzy extractor / Private biometrics / Error detection and correction / Password / Public key fingerprint / Cyclic redundancy check / Cryptographic hash function / Matching / Key

Bipartite Biotokens: Definition, Implementation, and Analysis W.J. Scheirer2,1,† and T.E. Boult1,2,†,? 1 Univ. of Colorado at Colorado Springs, Colorado Springs, CO

Add to Reading List

Source URL: www.vast.uccs.edu

Language: English - Date: 2010-10-23 12:03:49
56Cryptocurrencies / Error detection and correction / Hashing / Bitcoin / Cryptographic hash functions / Bitcoin network / Merkle tree / Cryptographic nonce / Hash list / Hash function / Public-key cryptography / Digital signature

Bitcoin: A Peer-to-Peer Electronic Cash System Satoshi Nakamoto www.bitcoin.org Abstract. A purely peer-to-peer version of electronic cash would allow online

Add to Reading List

Source URL: www.dcg.ethz.ch

Language: English - Date: 2014-09-26 08:28:56
57Cryptography / Hashing / Cryptographic hash functions / Search algorithms / Public-key cryptography / Digital signature / EdDSA / Random oracle / Descriptor / Hash function / Advantage

Proving Security of Tor’s Hidden Service Identity Blinding Protocol Tor Project Tech ReportNicholas Hopper 1

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2013-12-12 23:20:54
58Cryptographic hash functions / SHA-2 / SHA-1 / Radio-frequency identification / Crypt / Hash function / Secure Hash Algorithm / VEST / SHA-3

Low-Cost SHA-1 Hash Function Architecture for RFID Tags M. O’Neill (nee McLoone) Institute of Electronics, Communications, and Information Technology (ECIT) Queen’s University Belfast, Northern Ireland

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2008-07-21 05:29:13
59Fingerprinting algorithms / Hashing / Search algorithms / Locality-sensitive hashing / Hash function / MongoDB / Fingerprint / Chemical similarity / Cryptographic hash function / Acoustic fingerprint / IPython / Public key fingerprint

Michał Nowotka1, Anne Hersey1 [1] European Molecular Biology Laboratory - European Bioinformatics Institute Email: Locality Sensitive Hashing for compound similarity search.

Add to Reading List

Source URL: cisrg.shef.ac.uk

Language: English - Date: 2016-07-11 09:58:32
60

CRYPTANALYSIS OF A HASH FUNCTION BASED ON NORM FORM EQUATIONS JEAN-PHILIPPE AUMASSON Abstract. The cryptographic hash function Codefish is an outcome of a research project led by the company KRIPTO Research and the Unive

Add to Reading List

Source URL: 131002.net

Language: English - Date: 2012-08-14 06:46:45
    UPDATE