Cryptographic hash function

Results: 1121



#Item
971GOST / Differential cryptanalysis / Key schedule / ICE / Block cipher / Film speed / Differential of a function / Advanced Encryption Standard / Cryptography / GOST standards / Cryptographic hash functions

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-11 16:56:46
972Information science / Artificial intelligence / Hash function / Perfect hash function / Hash table / Cryptographic hash function / Trie / Universal hashing / Tabulation hashing / Search algorithms / Hashing / Information retrieval

PDF Document

Add to Reading List

Source URL: cs.mwsu.edu

Language: English - Date: 2009-01-31 15:44:11
973Search algorithms / Cryptography / Academia / Knowledge / Neil Gershenfeld / Year of birth missing / Hash function / Doctorate / Professor / Hashing / Education / Cryptographic hash functions

PDF Document

Add to Reading List

Source URL: alumni.media.mit.edu

Language: English - Date: 2001-07-08 09:43:43
974Applied mathematics / Hashing / Cryptographic hash functions / Analysis of algorithms / Universal hashing / Hash table / Hash function / Parallel Random Access Machine / NC / Theoretical computer science / Search algorithms / Computational complexity theory

PDF Document

Add to Reading List

Source URL: www.unclaw.com

Language: English - Date: 2009-04-03 14:08:37
975Information science / Error detection and correction / Artificial intelligence / Hash join / Hash table / Cryptographic hash functions / Hash function / Trie / Query optimizer / Hashing / Search algorithms / Information retrieval

PDF Document

Add to Reading List

Source URL: www.vldb.org

Language: English - Date: 2006-07-29 01:23:47
976Information retrieval / Artificial intelligence / Cryptographic hash functions / Error detection and correction / Hash function / Hash table / Key derivation function / Tabulation hashing / Rainbow table / Search algorithms / Cryptography / Hashing

scrypt.dvi

Add to Reading List

Source URL: www.tarsnap.com

Language: English - Date: 2011-10-27 15:49:52
977NIST hash function competition / Skein / Hashing / Threefish / Rotational cryptanalysis / SHA-2 / SHA-1 / Feistel cipher / Stefan Lucks / Cryptography / Error detection and correction / Cryptographic hash functions

PDF Document

Add to Reading List

Source URL: www.skein-hash.info

Language: English - Date: 2012-03-27 04:10:33
978Information science / Artificial intelligence / Hash function / Extendible hashing / Cryptographic hash function / Hash / Hash table / Linear hashing / Hashing / Search algorithms / Information retrieval

PDF Document

Add to Reading List

Source URL: www.smckearney.com

Language: English - Date: 2007-10-16 15:37:26
979Side channel attack / Cryptographic hash function / Cyberwarfare / Security / Espionage / Error detection and correction / Hash function

PDF Document

Add to Reading List

Source URL: www.see.ed.ac.uk

Language: English - Date: 2012-07-20 08:12:14
980Password / Salt / SQL injection / Cryptographic hash function / Cross-site scripting / MD5 / Crypt / Key derivation function / Cryptography / Cyberwarfare / Computer security

PDF Document

Add to Reading List

Source URL: lasecwww.epfl.ch

Language: English - Date: 2009-11-18 09:27:21
UPDATE