<--- Back to Details
First PageDocument Content
Information retrieval / Artificial intelligence / Cryptographic hash functions / Error detection and correction / Hash function / Hash table / Key derivation function / Tabulation hashing / Rainbow table / Search algorithms / Cryptography / Hashing
Date: 2011-10-27 15:49:52
Information retrieval
Artificial intelligence
Cryptographic hash functions
Error detection and correction
Hash function
Hash table
Key derivation function
Tabulation hashing
Rainbow table
Search algorithms
Cryptography
Hashing

scrypt.dvi

Add to Reading List

Source URL: www.tarsnap.com

Download Document from Source Website

File Size: 201,84 KB

Share Document on Facebook

Similar Documents

Cryptographic Hash Functions Part II Cryptography 1 Andreas Hülsing, TU/e Some slides by Sebastiaan de Hoogh, TU/e

DocID: 1uAoQ - View Document

How to Break MD5 and Other Hash Functions Xiaoyun Wang and Hongbo Yu Shandong University, Jinan, China, , Abstract. MD5 is one of the most widely used cryptographic hash funct

DocID: 1uyAd - View Document

Cryptographic Hash Functions Part I Cryptography 1 Andreas Hülsing, TU/e Based on slides by Sebastiaan de Hoogh, TU/e

DocID: 1tYRg - View Document

Cryptography / Cryptographic hash functions / SHA-2 / Twofish / Encryption / Secure voice / Public switched telephone network / Crypt

GSMK CryptoPhone PSTN/1 Secure PSTN Landline Telephone TECHNICAL SPECIFICATIONS Telephone Line Interface Standard analog PSTN/POTS interface with

DocID: 1rud6 - View Document