Cryptographic hash functions

Results: 1068



#Item
91Error detection and correction / Computer file formats / Search algorithms / Cryptographic hash functions / Hash list / Hash function / File system / File format / Windows Registry / Computing / Hashing / System software

SimHash: Hash-based Similarity Detection Caitlin Sadowski University of California, Santa Cruz Greg Levin

Add to Reading List

Source URL: simhash.googlecode.com

Language: English - Date: 2007-12-13 05:28:46
92Error detection and correction / Security / Information / Search algorithms / Fingerprint / Identifiers / Hash function / Public key fingerprint / Rabin–Karp algorithm / Hashing / Cryptography / Cryptographic hash functions

Winnowing: Local Algorithms for Document Fingerprinting Saul Schleimer Daniel S. Wilkerson Alex Aiken

Add to Reading List

Source URL: dsw.users.sonic.net

Language: English - Date: 2015-06-08 15:50:28
93Hashing / Computing / Information retrieval / Cryptography / Causality / Version vector / Hash table / Hash function / SHA-1 / Search algorithms / Mathematics / Cryptographic hash functions

Appears in Proceedings of the 23rd IEEE International Conference on Distributed Computing Systems (ICDCS ’03). The Hash History Approach for Reconciling Mutual Inconsistency Brent ByungHoon Kang, Robert Wilensky and J

Add to Reading List

Source URL: oceanstore.cs.berkeley.edu

Language: English - Date: 2003-03-13 15:50:35
94Bitcoin / Peer-to-peer computing / Payment systems / Financial cryptography / Cryptographic hash functions / Cryptography / Software / Computing

ISSCCIICT 2014, Limerick, June 26–27 Bitcoin Mining and its Energy Footprint Karl J. O’Dwyer† and David Malone∗ Hamilton Institute National University of Ireland Maynooth

Add to Reading List

Source URL: karlodwyer.github.io

Language: English - Date: 2014-06-25 06:07:20
95Cryptographic hash functions / Internet protocols / Secure communication / HMAC / Block cipher / SHA-2 / Symmetric-key algorithm / MD4 / RC4 / Cryptography / Hashing / Cryptographic software

Microsoft PowerPoint - preneel_enisa08v4.ppt

Add to Reading List

Source URL: www.nis-summer-school.eu

Language: English - Date: 2008-10-20 04:40:05
96Computer programming / Abstract data types / Data types / Information retrieval / Cryptographic hash functions / Hash table / Hash function / Associative array / Bit array / Search algorithms / Computing / Hashing

BRICS Basic Research in Computer Science BRICS RSPagh & Rodler: Lossy Dictionaries Lossy Dictionaries

Add to Reading List

Source URL: www.brics.dk

Language: English - Date: 2001-09-06 08:24:05
97Computer programming / MD5 / SHA-1 / SHA-2 / MD4 / ALGOL 68 / Struct / Hash function / Whirlpool / Cryptographic hash functions / Cryptography / Computing

Christian Grothoff COMP 3704 Computer Security Christian Grothoff

Add to Reading List

Source URL: grothoff.org

Language: English - Date: 2011-06-21 07:45:47
98Bitcoin / Peer-to-peer computing / Payment systems / Financial cryptography / Cryptographic hash functions / Cryptography / Software / Computing

ISSCCIICT 2014, Limerick, June 26–27 Bitcoin Mining and its Energy Footprint Karl J. O’Dwyer† and David Malone∗ Hamilton Institute National University of Ireland Maynooth

Add to Reading List

Source URL: karlodwyer.github.io

Language: English - Date: 2014-06-25 06:07:20
99Search algorithms / Cryptographic hash functions / Analysis of algorithms / Probabilistic complexity theory / Randomized algorithm / PP / Algorithm / Hash function / Universal hashing / Theoretical computer science / Applied mathematics / Computational complexity theory

A Scalable and Nearly Uniform Generator of SAT Witnesses? Supratik Chakraborty1 , Kuldeep S. Meel2 , and Moshe Y. Vardi2 1 2

Add to Reading List

Source URL: www.cs.rice.edu

Language: English - Date: 2013-07-17 18:10:56
100Cryptographic hash functions / The quick brown fox jumps over the lazy dog / Typography / Lazy Dog

Microsoft Word - eiss_template_en.docx

Add to Reading List

Source URL: www.gakkai-web.net

Language: English - Date: 2015-05-11 21:25:37
UPDATE