Error detection and correction

Results: 1767



#Item
151Cryptography / Information retrieval / Search algorithms / Information science / Hashing / Error detection and correction / Hash function / Cryptographic hash function / RSA

Efficient Negative Databases from Cryptographic Hash Functions George Danezis, Claudia Diaz, Sebastian Faust, Emilia K¨asper, Carmela Troncoso, and Bart Preneel K.U. Leuven, ESAT/COSIC, Kasteelpark Arenberg 10,

Add to Reading List

Source URL: www0.cs.ucl.ac.uk

Language: English - Date: 2013-10-10 06:48:57
152Search algorithms / Hashing / Error detection and correction / Hash function / Hash table / Big O notation / Cryptographic hash function / CohenSutherland algorithm

Introduction to Algorithms Massachusetts Institute of Technology Professors Srini Devadas and Constantinos (Costis) Daskalakis March 11, Spring 2009

Add to Reading List

Source URL: courses.csail.mit.edu

Language: English - Date: 2010-02-02 11:49:29
153Mathematics / Physics / Elementary arithmetic / Parity / Error detection and correction / Identifiers / Universal identifiers / International Article Number / Numerology / Divisibility rule / Number / Normal distribution

CrossMark_Color_Stacked_p

Add to Reading List

Source URL: sapir.psych.wisc.edu

Language: English - Date: 2015-07-14 14:47:54
154Cryptographic hash functions / Cryptography / Hashing / Information retrieval / Error detection and correction / Applied mathematics / SHA-2 / Merkle tree / SHA-1 / Hash list / Baseball at the 2013 East Asian Games / Baseball at the 2007 Southeast Asian Games

On Protecting Integrity and Confidentiality of Cryptographic File System for Outsourced Storage Aaram Yun, Chunhui Shi, Yongdae Kim University of Minnesota CCSW 2009, 13 Nov 2009

Add to Reading List

Source URL: digitalpiglet.org

Language: English - Date: 2009-11-27 08:30:51
155

Activity 4 Card flip magic—Error detection and correction Age group Middle elementary and up. Abilities assumed Requires counting and recognition of (small) odd and

Add to Reading List

Source URL: csunplugged.org

Language: English - Date: 2015-03-08 03:31:06
    156Cryptography / Cryptographic hash functions / Hashing / Message authentication codes / Error detection and correction / Secure Hash Algorithm / SHA-2 / Secure Hash Standard / SHA-1 / SHA-3 / Crypt / Digital Signature Algorithm

    FIPS PUBFEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Secure Hash Standard (SHS) CATEGORY: COMPUTER SECURITY

    Add to Reading List

    Source URL: nvlpubs.nist.gov

    Language: English - Date: 2015-08-04 11:33:21
    157Cryptography / Cryptographic hash functions / Error detection and correction / SHA-1 / SHA-2 / MD5 / NIST hash function competition / SHA-3 / Elliptic curve only hash / Elliptic Curve Digital Signature Algorithm / Libgcrypt / FORK-256

    Elliptic Curve Hash (and Sign) ECOH (and the 1-up problem for ECDSA) Daniel R. L. Brown Certicom Research ECC 2008, Utrecht, Sep

    Add to Reading List

    Source URL: www.hyperelliptic.org

    Language: English - Date: 2008-09-27 14:59:29
    158Information retrieval / Hashing / Error detection and correction / Information science / Computer programming / Cryptographic hash functions / Search algorithms / Distributed data storage / Bloom filter / Hash function / Hash list / Trie

    Data Discovery and Dissemination with DIP tinyos-2.x/tos/lib/net/dip Kaisen Lin UC San Diego

    Add to Reading List

    Source URL: sing.stanford.edu

    Language: English - Date: 2014-11-10 18:30:10
    159Cryptography / Hashing / Error detection and correction / Cryptographic hash functions / Search algorithms / Commitment scheme / Hash function / Coin flipping / RSA / Crypt

    Very-efficient flipping of many coins (between two parties) Luís T. A. N. Brandão University of Lisbon and Carnegie Mellon University

    Add to Reading List

    Source URL: www.iacr.org

    Language: English - Date: 2014-03-01 16:01:06
    160Cryptography / Message authentication codes / Pseudorandom function family / Pseudorandomness / Error detection and correction / Hash-based message authentication code / Advantage / Randomness extractor

    The Exact PRF-Security of NMAC and HMAC? Peter Gaˇzi, Krzysztof Pietrzak, and Michal Ryb´ar IST Austria JulyAbstract. NMAC is a mode of operation which turns a fixed input-length keyed hash function f into a

    Add to Reading List

    Source URL: pub.ist.ac.at

    Language: English - Date: 2014-07-24 05:23:52
    UPDATE