Cryptographic hash function

Results: 1121



#Item
1

Appears in Fast Software Encryption(FSE 2004), Lecture Notes in Computer Science, Vol. ????, Springer-Verlag. This is the full version. Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for P

Add to Reading List

Source URL: web.cs.ucdavis.edu

- Date: 2004-02-12 14:18:41
    2Information science / Information retrieval / Hashing / Countmin sketch / Recommender system / MinHash / K-nearest neighbors algorithm / Feature hashing / Cryptographic hash function / Collaborative filtering

    POIsketch: Semantic Place Labeling over User Activity Streams 1 Dingqi Yang1 , Bin Li2 , Philippe Cudr´e-Mauroux1 eXascale Infolab, University of Fribourg, 1700 Fribourg, Switzerland 2

    Add to Reading List

    Source URL: exascale.info

    Language: English - Date: 2016-08-17 10:09:29
    3Cryptography / Cryptographic hash functions / Hashing / Applied mathematics / Cryptocurrencies / Public-key cryptography / Cryptographic nonce / SHA-2 / Bitcoin / Crypt / Hash function / Padding

    The Politics of Cryptography: Bitcoin and The Ordering Machines

    Add to Reading List

    Source URL: iqdupont.com

    Language: English - Date: 2015-12-03 10:50:31
    4Information retrieval / Search algorithms / Information science / Hashing / Cryptographic hash functions / Error detection and correction / Hash function / Hash table / Universal hashing / Locality-sensitive hashing

    Algorithms and Data Structures Winter TermExercises for UnitLet U = {0, 1, . . . , K − 1}, let p ≥ K be a prime number, and let 0 < t < K. For 0 ≤ a, b < p define

    Add to Reading List

    Source URL: www-tcs.cs.uni-sb.de

    Language: English - Date: 2016-03-06 16:06:05
    5Cryptography / Public-key cryptography / IP / Undeniable signature / Digital signature / Challengeresponse authentication / David Chaum / Cryptographic hash function / RSA

    l l l Il l l l| | l| l l l l l?gl lug gl lul l l l l l l l l l l l l l United States PatentPatent Number:

    Add to Reading List

    Source URL: www.chaum.com

    Language: English - Date: 2015-05-26 20:08:31
    6Cryptography / Cryptographic hash functions / Hashing / Applied mathematics / Cryptocurrencies / Public-key cryptography / Cryptographic nonce / SHA-2 / Bitcoin / Crypt / Hash function / Padding

    The Politics of Cryptography: Bitcoin and The Ordering Machines

    Add to Reading List

    Source URL: www.iqdupont.com

    Language: English - Date: 2015-12-03 10:50:31
    7Information retrieval / Information science / Hashing / Search algorithms / Universal hashing / Hash table / Linear probing / Hash function / Bloom filter / Cuckoo hashing / Randomness extractor / Cryptographic hash function

    Why Simple Hash Functions Work: Exploiting the Entropy in a Data Stream∗ Michael Mitzenmacher† Salil Vadhan‡ School of Engineering & Applied Sciences Harvard University

    Add to Reading List

    Source URL: www.eecs.harvard.edu

    Language: English - Date: 2007-11-16 13:42:30
    8Cryptography / Encodings / X.690 / Computing / Information / Abstract Syntax Notation One / PKCS 1 / Padding / Hash function / Octet / Cryptographic hash function / RSA

    ASN.1 parsing in crypto libraries: what could go wrong? Andrew Furtak, Yuriy Bulygin, Alex Bazhaniuk Advanced Threat Research

    Add to Reading List

    Source URL: www.intelsecurity.com

    Language: English - Date: 2016-05-02 12:28:32
    UPDATE