Cryptographic hash function

Results: 1121



#Item
81Cryptocurrencies / E-commerce / Economy / Money / Proof-of-stake / Peercoin / Bitcoin network / Bitcoin / Blockchain / Cryptographic hash function / Consensus / BlackCoin

BlackCoin’s Proof-of-Stake Protocol v2 Pavel Vasin www.blackcoin.co Abstract—The current Proof of Stake protocol has several potential security issues: coin age can be abused by malicious nodes to gain significant ne

Add to Reading List

Source URL: blackcoin.co

Language: English - Date: 2016-02-17 22:48:53
82Cryptography / Information retrieval / Search algorithms / Information science / Hashing / Error detection and correction / Hash function / Cryptographic hash function / RSA

Efficient Negative Databases from Cryptographic Hash Functions George Danezis, Claudia Diaz, Sebastian Faust, Emilia K¨asper, Carmela Troncoso, and Bart Preneel K.U. Leuven, ESAT/COSIC, Kasteelpark Arenberg 10,

Add to Reading List

Source URL: www0.cs.ucl.ac.uk

Language: English - Date: 2013-10-10 06:48:57
83Search algorithms / Hashing / Error detection and correction / Hash function / Hash table / Big O notation / Cryptographic hash function / CohenSutherland algorithm

Introduction to Algorithms Massachusetts Institute of Technology Professors Srini Devadas and Constantinos (Costis) Daskalakis March 11, Spring 2009

Add to Reading List

Source URL: courses.csail.mit.edu

Language: English - Date: 2010-02-02 11:49:29
84Cryptography / Hashing / Search algorithms / Cryptographic hash functions / Hash function / Hash table / RSA / Crypt / Block cipher / Universal hashing / Scrypt

STRONGER KEY DERIVATION VIA SEQUENTIAL MEMORY-HARD FUNCTIONS COLIN PERCIVAL Abstract. We introduce the concepts of memory-hard algorithms and sequential memory-hard functions, and argue that in order for key derivation f

Add to Reading List

Source URL: www.daemonology.net

Language: English - Date: 2009-06-11 07:29:01
85Cryptographic hash functions / NIST hash function competition / SHA-3

SHA-3 Conference, February 2009, Shabal

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-05 11:30:32
86Cryptography / Cryptographic hash functions / Hashing / NIST hash function competition / SHA-3 / Secure Hash Algorithm / SHA-2 / SHA-1 / Hash-based message authentication code / Secure Hash Standard / Sponge function / Hash function

SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions

Add to Reading List

Source URL: nvlpubs.nist.gov

Language: English - Date: 2015-08-04 11:34:10
87Cryptocurrencies / Bitcoin / Alternative currencies / Computing / E-commerce / Currency / Bitcoin network / Hashing / B-tree / Blockchain / Cryptographic hash function / Draft:Viccoin:APeer-to-PeerDigital Currency System

Secure High-Rate Transaction Processing in Bitcoin Yonatan Sompolinsky1 and Aviv Zohar1,2 1 School of Engineering and Computer Science,

Add to Reading List

Source URL: fc15.ifca.ai

Language: English - Date: 2015-01-11 00:33:39
88Hashing / Cryptographic hash function / Trie / Merkle tree / RSA / B-tree

VeriStream – A Framework for Verifiable Data Streaming Dominique Sch¨oder and Mark Simkin Saarland University Saarbr¨ ucken, Germany

Add to Reading List

Source URL: fc15.ifca.ai

Language: English - Date: 2015-01-11 00:33:17
89Hashing / Search algorithms / Hash function / Cryptographic hash function / Join / Dynamic programming / Record linkage / Hash table / Dynamic perfect hashing

Optimal Hashing Schemes for Entity Matching Nilesh Dalvi Vibhor Rastogi Anirban Dasgupta

Add to Reading List

Source URL: www2013.wwwconference.org

Language: English - Date: 2014-07-21 08:47:06
90Key management / Cryptography standards / Cryptography / FIPS 201 / Standards / Key size / Cryptographic hash function / Key / Cryptographic Module Validation Program / Digital Signature Algorithm / Public-key cryptography / Smart card

NIST Special Publication

Add to Reading List

Source URL: nvlpubs.nist.gov

Language: English - Date: 2015-06-10 13:59:58
UPDATE