Cryptographic hash function

Results: 1121



#Item
1Appears in Fast Software Encryption(FSE 2004), Lecture Notes in Computer Science, Vol. ????, Springer-Verlag. This is the full version. Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for P

Appears in Fast Software Encryption(FSE 2004), Lecture Notes in Computer Science, Vol. ????, Springer-Verlag. This is the full version. Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for P

Add to Reading List

Source URL: web.cs.ucdavis.edu

- Date: 2004-02-12 14:18:41
    2POIsketch: Semantic Place Labeling over User Activity Streams 1 Dingqi Yang1 , Bin Li2 , Philippe Cudr´e-Mauroux1 eXascale Infolab, University of Fribourg, 1700 Fribourg, Switzerland 2

    POIsketch: Semantic Place Labeling over User Activity Streams 1 Dingqi Yang1 , Bin Li2 , Philippe Cudr´e-Mauroux1 eXascale Infolab, University of Fribourg, 1700 Fribourg, Switzerland 2

    Add to Reading List

    Source URL: exascale.info

    Language: English - Date: 2016-08-17 10:09:29
    3The Politics of Cryptography: Bitcoin and The Ordering Machines

    The Politics of Cryptography: Bitcoin and The Ordering Machines

    Add to Reading List

    Source URL: iqdupont.com

    Language: English - Date: 2015-12-03 10:50:31
    4Algorithms and Data Structures Winter TermExercises for UnitLet U = {0, 1, . . . , K − 1}, let p ≥ K be a prime number, and let 0 < t < K. For 0 ≤ a, b < p define

    Algorithms and Data Structures Winter TermExercises for UnitLet U = {0, 1, . . . , K − 1}, let p ≥ K be a prime number, and let 0 < t < K. For 0 ≤ a, b < p define

    Add to Reading List

    Source URL: www-tcs.cs.uni-sb.de

    Language: English - Date: 2016-03-06 16:06:05
    5l l l Il l l l| | l| l l l l l?gl lug gl lul l l l l l l l l l l l l l United States PatentPatent Number:

    l l l Il l l l| | l| l l l l l?gl lug gl lul l l l l l l l l l l l l l United States PatentPatent Number:

    Add to Reading List

    Source URL: www.chaum.com

    Language: English - Date: 2015-05-26 20:08:31
    6The Politics of Cryptography: Bitcoin and The Ordering Machines

    The Politics of Cryptography: Bitcoin and The Ordering Machines

    Add to Reading List

    Source URL: www.iqdupont.com

    Language: English - Date: 2015-12-03 10:50:31
    7Why Simple Hash Functions Work: Exploiting the Entropy in a Data Stream∗ Michael Mitzenmacher† Salil Vadhan‡ School of Engineering & Applied Sciences Harvard University

    Why Simple Hash Functions Work: Exploiting the Entropy in a Data Stream∗ Michael Mitzenmacher† Salil Vadhan‡ School of Engineering & Applied Sciences Harvard University

    Add to Reading List

    Source URL: www.eecs.harvard.edu

    Language: English - Date: 2007-11-16 13:42:30
    8ASN.1 parsing in crypto libraries: what could go wrong? Andrew Furtak, Yuriy Bulygin, Alex Bazhaniuk Advanced Threat Research

    ASN.1 parsing in crypto libraries: what could go wrong? Andrew Furtak, Yuriy Bulygin, Alex Bazhaniuk Advanced Threat Research

    Add to Reading List

    Source URL: www.intelsecurity.com

    Language: English - Date: 2016-05-02 12:28:32