Cryptographic hash functions

Results: 1068



#Item
781Data synchronization / Error detection and correction / Cryptographic hash functions / Rsync / Software / Search algorithms / Rabin fingerprint / Hash list / Hash function / Computing / System software / Hashing

Improved Single-Round Protocols for Remote File Synchronization Utku Irmak Svilen Mihaylov

Add to Reading List

Source URL: cis.poly.edu

Language: English - Date: 2004-12-25 15:24:25
782Computing / System software / Rsync / Software / Cryptographic hash functions / Search algorithms / Hash list / Hash function / Remote Differential Compression / Data synchronization / Hashing / Error detection and correction

File Synchronization Problem Improved File Synchronization Techniques for Maintaining Large Replicated Collections over Slow Networks update

Add to Reading List

Source URL: cis.poly.edu

Language: English - Date: 2004-05-08 13:04:25
783Information retrieval / Information science / Artificial intelligence / Hash table / Cryptographic hash functions / Hash function / Hash list / Trie / Database index / Search algorithms / Error detection and correction / Hashing

Do migrating secondaries give you migraines? F. Alfredo Rego Adager Corporation Sun Valley, Idaho[removed] • USA http://www.adager.com

Add to Reading List

Source URL: www.adager.com

Language: English - Date: 2003-07-08 19:03:44
784Hashing / Hash function / SHA-2 / Hash / Uniform resource identifier / Computing / Information retrieval / Artificial intelligence / Search algorithms / Cryptographic hash functions / Cryptography

1 Proposed changes for the Genomics Education Partnership Pre/Post Course Survey (HRPO Number X06-56, original project approved October 13, 2006; modification approved May 14, 2007) This research surveys attitudes to

Add to Reading List

Source URL: gep.wustl.edu

Language: English - Date: 2010-12-27 14:24:32
785Hashing / Computing / Software / Bitcoin / Peer-to-peer computing / Hash tree / Hash list / Hash function / Cryptographic nonce / Cryptography / Error detection and correction / Cryptographic hash functions

Bitcoin: A Peer-to-Peer Electronic Cash System Satoshi Nakamoto [removed] www.bitcoin.org Abstract. A purely peer-to-peer version of electronic cash would allow online

Add to Reading List

Source URL: bitcoin.org

Language: English - Date: 2014-07-01 15:32:51
786Hashing / Computing / Software / Bitcoin / Peer-to-peer computing / Hash tree / Hash list / Hash function / Cryptographic nonce / Cryptography / Error detection and correction / Cryptographic hash functions

Bitcoin: A Peer-to-Peer Electronic Cash System Satoshi Nakamoto [removed] www.bitcoin.org Abstract. A purely peer-to-peer version of electronic cash would allow online

Add to Reading List

Source URL: franksz.files.wordpress.com

Language: English - Date: 2013-02-12 17:26:35
787Error detection and correction / Cryptographic hash functions / Hashing / Barbecue / Hash Bash / Barbecue in the United States / Hash function / Hash list / Hash / Food and drink / Cooking / American cuisine

The PIEDMONT BLUES and HASH BASH

Add to Reading List

Source URL: www.bluesandhash.com

Language: English - Date: 2012-08-28 12:20:23
788SHA-2 / RIPEMD / MD5 / Preimage attack / SHA-1 / MD4 / Collision attack / Collision resistance / Merkle–Damgård construction / Cryptographic hash functions / Error detection and correction / Cryptography

Microsoft PowerPoint - preneel_hash_albenav2_print.ppt

Add to Reading List

Source URL: homes.esat.kuleuven.be

Language: English - Date: 2011-06-30 04:42:21
789Cryptographic hash functions / Advanced Encryption Standard / Secure communication / HMAC / SHA-2 / Block cipher / Key size / Symmetric-key algorithm / MD4 / Cryptography / Hashing / Cryptographic software

Microsoft PowerPoint - preneel_mmm10v1.ppt

Add to Reading List

Source URL: homes.esat.kuleuven.be

Language: English - Date: 2010-09-10 07:39:29
790Hash function / Collision resistance / MD5 / SHA-1 / Differential cryptanalysis / MD4 / Block cipher / SHA-2 / Preimage attack / Cryptographic hash functions / Error detection and correction / Cryptography

´ n, a belt-and-mill hash function RadioGatu Guido Bertoni, Joan Daemen, Gilles Van Assche STMicroelectronics Micha¨el Peeters

Add to Reading List

Source URL: radiogatun.noekeon.org

Language: English - Date: 2013-02-27 15:27:44
UPDATE