Error detection and correction

Results: 1767



#Item
161Information retrieval / Hashing / Information science / Search algorithms / Error detection and correction / Cryptography / Cryptographic hash functions / Arrays / Hash table / Hash function / Hash list / Hash

Efficient Testing Operations on Dynamic Graph Structures using Strong Hash Functions Hoyt Koepke∗ Elizabeth Thompson∗

Add to Reading List

Source URL: www.stat.washington.edu

Language: English - Date: 2010-03-17 13:23:00
162Cryptography / Cryptographic hash functions / Hashing / Error detection and correction / NIST hash function competition / SHA-3 / Secure Hash Algorithm / SHA-2 / SHA-1 / Secure Hash Standard / Crypt / Hash function

Additional Secure hash Algorithm Standards Offer New Opportunities for Data Protection

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-09-24 10:22:35
163Cryptography / Cryptographic hash functions / Hashing / Error detection and correction / Universal one-way hash function / Preimage attack / Collision resistance / Hash function / Hash list / SHA-3 / One-way compression function

Introduction MD New Results I

Add to Reading List

Source URL: www.hyperelliptic.org

Language: English - Date: 2008-09-27 14:59:29
164Cryptography / Cryptographic hash functions / Search algorithms / Hashing / Revenue stamps / Error detection and correction / Hash function / Digital signature / Universal one-way hash function / Claw-free permutation / E-stamping

How to Time-Stamp a Digital Document Stuart Haber W. Scott Stornetta

Add to Reading List

Source URL: www.anf.es

Language: English - Date: 2014-05-12 07:16:17
165Stream ciphers / Pseudorandom number generators / Algebra / Error detection and correction / Binary arithmetic / Linear-feedback shift register / BerlekampMassey algorithm / Correlation attack / Nonlinear feedback shift register / Polynomial / Recurrence relation / Key generator

Stream cipher A stream cipher is a symmetric cipher which operates with a time-varying transformation on individual plaintext digits. By contrast, block ciphers operate with a fixed transformation on large blocks of plai

Add to Reading List

Source URL: www.rocq.inria.fr

Language: English - Date: 2006-03-23 08:13:04
166Coding theory / Error detection and correction / Information theory / Discrete mathematics / Mathematics / Linear code / Hamming code / ReedSolomon error correction / Forward error correction / Hamming / Generator matrix / Singleton bound

Signal and Information Processing Laboratory Institut für Signal- und Informationsverarbeitung August 2015

Add to Reading List

Source URL: www.isiweb.ee.ethz.ch

Language: English - Date: 2015-08-31 15:43:54
167Cryptography / Information retrieval / Search algorithms / Information science / Cryptographic hash functions / Hashing / Error detection and correction / Hash table / SHA-1 / Version vector / Hash function / Euclidean vector

Appears in Proceedings of the 23rd IEEE International Conference on Distributed Computing Systems (ICDCS ’03). The Hash History Approach for Reconciling Mutual Inconsistency Brent ByungHoon Kang, Robert Wilensky and J

Add to Reading List

Source URL: www.oceanstore.org

Language: English - Date: 2003-03-13 15:50:35
168Search algorithms / Hashing / Dimension reduction / Locality-sensitive hashing / Error detection and correction / Hash function / Relevance / Recommender system / K-nearest neighbors algorithm

Real-Time Recommendation of Diverse Related Articles Sofiane Abbar Sihem Amer-Yahia Piotr Indyk

Add to Reading List

Source URL: www2013.wwwconference.org

Language: English - Date: 2014-07-21 08:47:06
169Cryptography / Hashing / Error detection and correction / Public-key cryptography / Search algorithms / Digital signature / Cryptographic hash function / Post-quantum cryptography / RSA / Hash function / Merkle tree / MD5

SPHINCS: practical stateless hash-based signatures 1,3 , Daira Hopwood2 , Andreas Hülsing3 , Tanja Lange3 , 3 4 4 Ruben Niederhagen , Louiza Papachristodoulou , Peter Schwabe , and

Add to Reading List

Source URL: cryptojedi.org

Language: English - Date: 2014-10-04 10:08:48
170Mathematics / Coding theory / Error detection and correction / Operations research / Physics / Discrete mathematics / Linear programming / Convex optimization / Low-density parity-check code / Parity / Linear code / Duality

CS264: Beyond Worst-Case Analysis Lecture #11: LP Decoding∗ Tim Roughgarden† October 29,

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2014-11-28 08:18:54
UPDATE