Cryptographic hash functions

Results: 1068



#Item
271Computing / Hashing / Mathematics / Applied mathematics / Hash table / Hash function / Parallel computing / Algorithm / Collision / Cryptographic hash functions / Search algorithms / Cryptography

MOMENTUM - A MEMORY-HARD PROOF-OF-WORK VIA FINDING BIRTHDAY COLLISIONS DANIEL LARIMER Invictus Innovations, Inc ABSTRACT. We introduce the concept of memory-hard proof-of-work

Add to Reading List

Source URL: www.hashcash.org

Language: English - Date: 2014-01-13 13:07:17
272Hashing / Computing / Software / Bitcoin / Peer-to-peer computing / Hash tree / Hash list / Hash function / Cryptographic nonce / Cryptography / Error detection and correction / Cryptographic hash functions

Bitcoin: A Peer-to-Peer Electronic Cash System Satoshi Nakamoto www.bitcoin.org Abstract. A purely peer-to-peer version of electronic cash would allow online

Add to Reading List

Source URL: www.weusecoins.com

Language: English - Date: 2015-04-20 01:14:27
273Hash list / LOCKSS / Transmission Control Protocol / Localhost / Hash function / Computing / Network architecture / Information science / Error detection and correction / Cryptographic hash functions / Hashing

file:///tmp/voter-good.txt # Receive Poll message, create V3Voter to handle it 16:09:59.842: Debug: 3-V3Voter: ThreadId 3 is SCommRcv: TCP:[]::09:59.842: Debug3: 3-V3Voter: Creating V3 Voter for poll: H

Add to Reading List

Source URL: documents.clockss.org

Language: English - Date: 2014-07-21 13:42:30
274Password / Crypt / Cryptographic hash functions / Bcrypt / Salt / Shadow password / Key derivation function / Passwd / Dictionary attack / Cryptography / Cryptographic software / Key management

Issues for Consideration in the Review of Australian Higher Education April 2008 Vision As a peak body of established private providers of longstanding in the higher education sector our vision for higher education in Au

Add to Reading List

Source URL: cophe.edu.au

Language: English - Date: 2013-08-13 02:16:09
275Password / Crypt / Cryptographic hash functions / Bcrypt / Salt / Shadow password / Key derivation function / Passwd / Dictionary attack / Cryptography / Cryptographic software / Key management

THE ADVANCED COMPUTING SYSTEMS ASSOCIATION The following paper was originally published in the Proceedings of the FREENIX Track: 1999 USENIX Annual Technical Conference

Add to Reading List

Source URL: static.usenix.org

Language: English - Date: 1999-06-14 15:28:14
276LOCKSS / Hash list / Transmission Control Protocol / Localhost / Network architecture / Computing / Internet / Cryptographic hash functions / Hashing / Error detection and correction

file:///tmp/voter-bad.txt # Receive a Poll message and create a V3Voter to handle it 19:30:47.331: Debug: 3-V3Voter: ThreadId 3 is SCommRcv: TCP:[]::30:47.332: Debug3: 3-V3Voter: Creating V3 Voter for p

Add to Reading List

Source URL: documents.clockss.org

Language: English - Date: 2014-07-21 13:43:31
277Error detection and correction / Hash function / One-way compression function / Elliptic curve only hash / Cryptography / Cryptographic hash functions / Hashing

CS255: Cryptography and Computer Security Winter 2003 Assignment #2 Due: Wednesday, February 19th, 2003.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2003-02-14 22:08:35
278Message authentication codes / Hashing / Hash function / MD5 / SHA-1 / Block cipher / Collision resistance / One-way compression function / CBC-MAC / Cryptography / Error detection and correction / Cryptographic hash functions

CS255: Cryptography and Computer Security Winter 2006 Assignment #2 Due: Wednesday, February 22nd, 2006.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2006-02-13 15:01:47
279Hashing / Hash function / MD5 / SHA-1 / Collision resistance / Collision / One-way compression function / Merkle–Damgård construction / Cryptographic hash functions / Error detection and correction / Cryptography

CS255: Cryptography and Computer Security Winter 2007 Assignment #2 Due: Friday, Feb. 23, 2007.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2007-02-17 22:43:38
280Error detection and correction / Message authentication codes / Hash function / ElGamal signature scheme / Hash tree / Digital signature / Collision resistance / One-way compression function / Lamport signature / Cryptography / Cryptographic hash functions / Hashing

CS255: Cryptography and Computer Security Winter 1999 Assignment #3

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 1999-02-22 15:26:53
UPDATE