Error detection and correction

Results: 1767



#Item
431Hashing / Computing / Software / Bitcoin / Peer-to-peer computing / Hash tree / Hash list / Hash function / Cryptographic nonce / Cryptography / Error detection and correction / Cryptographic hash functions

Bitcoin: A Peer-to-Peer Electronic Cash System Satoshi Nakamoto www.bitcoin.org Abstract. A purely peer-to-peer version of electronic cash would allow online

Add to Reading List

Source URL: nakamotoinstitute.org

Language: English - Date: 2014-03-23 11:36:20
432Hashing / SHA-2 / SHA-1 / Secure Hash Standard / HMAC / Crypt / Hash function / Padding / NSA Suite B Cryptography / Error detection and correction / Cryptographic hash functions / Cryptography

fipswith change notice.doc

Add to Reading List

Source URL: techheap.packetizer.com

Language: English - Date: 2004-09-21 12:04:14
433Coding theory / Error detection and correction / Theoretical computer science / Numerical analysis / McEliece cryptosystem / Post-quantum cryptography / Niederreiter cryptosystem / List decoding / Horner scheme / Mathematics / Public-key cryptography / Applied mathematics

Fast and Secure Root Finding for Code-based Cryptosystems Falko Strenzke 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-08-07 11:04:10
434Computer algebra / Numerical linear algebra / Finite fields / Algebraic geometry / Error detection and correction / Gröbner basis / Matrix / Hidden Field Equations / Gaussian elimination / Algebra / Mathematics / Abstract algebra

Small Linearization: Memory Friendly Solving of Non-Linear Equations over Finite Fields Christopher Wolf & Enrico Thomae Horst Görtz Institute for IT-security Faculty of Mathematics

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-14 05:32:54
435Peer-to-peer computing / Concurrent computing / Transaction processing / Cryptographic hash functions / Error detection and correction / Hashing / Computing / Software / Bitcoin

Accelerating Bitcoin’s Transaction Processing Fast Money Grows on Trees, Not Chains Yonatan Sompolinsky∗ Aviv Zohar†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-12-31 04:08:51
436SHA-1 / MD4 / MD5 / Differential cryptanalysis / RIPEMD / Hamming weight / A5/1 / ICE / Hash function / Cryptography / Error detection and correction / Cryptographic hash functions

Finding good differential patterns for attacks on SHA-1 Krystian Matusiewicz and Josef Pieprzyk Centre for Advanced Computing - Algorithms and Cryptography, Department of Computing, Macquarie University, Sydney, NSW 2109

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-12-19 18:19:12
437Cryptographic hash functions / Computer security / Hash tree / Peer-to-peer / Trusted timestamping / Hash function / Digital signature / Hash list / Linked timestamping / Cryptography / Hashing / Error detection and correction

Keyless Signatures’ Infrastructure: How to Build Global Distributed Hash-Trees Ahto Buldas1,2 , Andres Kroonmaa1 , and Risto Laanoja1,2 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-12-15 18:39:49
438Estimation theory / Fixed effects model / Regression analysis / Coding theory / Communication / Error detection and correction

Short collusion-secure fingerprint codes against three pirates Koji Nuida Research Center for Information Security (RCIS), National Institute of Advanced Industrial Science and Technology (AIST), Sotokanda, Chiyo

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-12-15 09:16:20
439Applied mathematics / Information theory / Information / Public-key cryptography / Cybernetics / List decoding / Binary symmetric channel / Key size / RSA / Coding theory / Error detection and correction / Mathematics

A Coding-Theoretic Approach to Recovering Noisy RSA Keys Kenneth G. Paterson, Antigoni Polychroniadou, and Dale L. Sibborn Information Security Group, Royal Holloway, University of London Abstract. Inspired by cold boot

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-01-06 12:25:19
440Statistics / Mathematical structures / Learning with errors / Machine learning / Error detection and correction / Public-key cryptography / Normal distribution / RSA / Hash function / Algebra / Mathematics / Cryptography

An improved compression technique for signatures based on learning with errors Shi Bai and Steven D. Galbraith Department of Mathematics, University of Auckland, New Zealand.

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-01-22 16:26:55
UPDATE