Cryptographic hash functions

Results: 1068



#Item
141Hash function / Computing / Hashing / Information retrieval / Artificial intelligence / List / Hash list / ZPAQ / Hash table / Error detection and correction / Search algorithms / Cryptographic hash functions

Microsoft Word - How WCopyfind and Copyfind work.docx

Add to Reading List

Source URL: plagiarism.bloomfieldmedia.com

Language: English - Date: 2011-11-02 09:10:39
142SHA-1 / RIPEMD / Hash function / Crypt / Hash list / MD4 / MD5 / Cryptographic hash functions / Cryptography / SHA-2

Japan Cryptographic Module Validation Program(JCMVP) Specifications of Cryptographic Algorithm Implementation Testing — Hash Functions —

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-05-28 08:15:33
143Search algorithms / Hash House Harriers / Hash function / Hash list / Hash / Human behavior / Information retrieval / Artificial intelligence / Error detection and correction / Cryptographic hash functions / Hashing

MOUNT VERNON HASH HOUSE HARRIERS 2015 ANNUAL GENERAL MEETING (AGM) When: Friday 17 April 2015 to Sunday 19 Aprilnights) Where: Dewey Beach, DE Hash hotel: Atlantic Oceanside Motel, 1700 Coastal Hwy, Dewey Beach,

Add to Reading List

Source URL: www.dchashing.org

Language: English - Date: 2014-12-26 18:09:44
144Hashing / MD5 / Search algorithms / Collision attack / Padding / X.509 / Hash function / RSA / Cryptography / Public-key cryptography / Cryptographic hash functions

Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate Marc Stevens1 , Alexander Sotirov2 , Jacob Appelbaum3 , Arjen Lenstra4,5 , David Molnar6 , Dag Arne Osvik4 , and Benne de Weger7 1

Add to Reading List

Source URL: deweger.xs4all.nl

Language: English
145Public-key cryptography / Error detection and correction / Merkle signature scheme / Digital signature / Hash function / Hash tree / Collision attack / RSA / MD5 / Cryptography / Hashing / Cryptographic hash functions

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-09 11:38:04
146Information science / Artificial intelligence / Tabulation hashing / Hash function / Linear probing / Cuckoo hashing / Cryptographic hash function / Hash list / Universal hashing / Hashing / Search algorithms / Information retrieval

May 2013 MADALGO seminar by Mikkel Thorup, University of Copenhagen The Power of Tabulation Hashing Abstract: Abstract Randomized algorithms are often enjoyed for their simplicity, but the hash functions used to yield

Add to Reading List

Source URL: old-madalgo.au.dk

Language: English - Date: 2013-05-10 08:51:10
147Cut / Lazy Dog / Cryptographic hash functions / Typography / The quick brown fox jumps over the lazy dog / Computing

Microsoft Word - AAI Letter to Sens Carper and Coburn.government spending on conferences

Add to Reading List

Source URL: aai.org

Language: English - Date: 2014-08-04 12:04:02
148Error detection and correction / Cryptography / Information retrieval / Computing / Hash table / Hash function / Rainbow table / NTLM / Hash / Search algorithms / Hashing / Cryptographic hash functions

Advancements in TMTOs Steve Thomas “Sc00bz” Passwords^12 TobTu.com/passwords12 1

Add to Reading List

Source URL: passwords12.at.ifi.uio.no

Language: English - Date: 2012-12-06 12:19:04
149Error detection and correction / Search algorithms / Hash function / MD5 / Collision / SHA-1 / Hash list / Claw-free permutation / Collision attack / Cryptographic hash functions / Cryptography / Hashing

Secure Names for Bit-Strings Stuart Haber* W. Scott Stornetta*

Add to Reading List

Source URL: nakamotoinstitute.org

Language: English - Date: 2014-03-23 11:44:47
150Cryptographic hash functions / Computability theory / Random oracle / Oracle machine / Oracle Corporation / Proof of knowledge / L / Standard model / Oracle Database / Cryptography / Theoretical computer science / Cryptographic protocols

Non Observability in the Random Oracle Model Prabhanjan Ananth and Raghav Bhaskar Microsoft Research India BangaloreAbstract

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-18 23:51:34
UPDATE