Error detection and correction

Results: 1767



#Item
441Hashing / Error detection and correction / Digital signature / Hash tree / SHA-2 / SHA-1 / RSA / Hash function / Merkle signature scheme / Cryptography / Cryptographic hash functions / Public-key cryptography

One-Time Signatures Revisited: Have They Become Practical? Dalit Naor∗ Amir Shenhav† Avishai Wool‡

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-12-02 02:25:54
442Error detection and correction / Security / British music / Music / Business / Financial regulation / International Securities Identification Number / Orchestral Manoeuvres in the Dark

DOCX Document

Add to Reading List

Source URL: sc.hkex.com.hk

Language: English - Date: 2013-04-02 21:23:24
443Computer architecture / Classes of computers / Parallel computing / Information science / Error detection and correction / Hash function / Hash table / CPU cache / Trie / Computing / Search algorithms / Hashing

Department of Electrical and Computer Systems Engineering Technical Report MECSE

Add to Reading List

Source URL: www.ecse.monash.edu.au

Language: English - Date: 2007-11-19 17:29:34
444Search algorithms / Error detection and correction / MD5 / Collision resistance / Hash function / SHA-1 / Birthday attack / Collision / Quadratic probing / Cryptographic hash functions / Cryptography / Hashing

Chapter 6 Hash Functions A hash function usually means a function that compresses, meaning the output is shorter than the input. Often, such a function takes an input of arbitrary or almost arbitrary length to one whose

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2009-09-20 23:24:55
445Mathematics / Packaging / Security / Malleability / Tamper resistance / Noisy-channel coding theorem / Information / Telecommunications engineering / Ciphertext indistinguishability / Coding theory / Cryptography / Error detection and correction

Non-Malleable Codes Stefan Dziembowski ∗ Krzysztof Pietrzak † Daniel Wichs ‡

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-01-15 11:15:53
446Error detection and correction / Markov models

=1=Viterbi Training Improves - Unsupervised Dependency Parsing

Add to Reading List

Source URL: nlp.stanford.edu

Language: English - Date: 2010-07-15 09:10:14
447Hashing / System software / Error detection and correction / Hash table / Hash function / Computer virus / Hash list / COM file / Ar / Computing / Search algorithms / Software

VIRUS BULLETIN www.virusbtn.com MALWARE ANALYSIS MAKING A HASH OF THINGS Peter Ferrie Microsoft, USA

Add to Reading List

Source URL: vxheaven.org

Language: English - Date: 2009-09-01 15:48:44
448Telecommunications engineering / Mathematics / Turbo code / Forward error correction / Concatenated error correction code / Trellis modulation / Linear code / Code rate / Puncturing / Error detection and correction / Information / Convolutional code

A Novel Technique To Evaluate the Transfer Function of Punctured Turbo Codes Ioannis Chatzigeorgiou, Miguel R. D. Rodrigues, Ian J. Wassell Rolando Carrasco

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2007-06-29 06:52:43
449Hashing / HMAC / SHA-1 / Advanced Encryption Standard / SHA-2 / Cryptographic protocols / Error detection and correction / Cryptography / Cryptographic hash functions

Microsoft Word - CTP RevisionregardingStep 4.doc

Add to Reading List

Source URL: dcimovies.com

Language: English - Date: 2014-04-30 01:19:05
450Error detection and correction / Digital signature / Hash function / RSA / Lamport signature / Cryptography / Public-key cryptography / Key management

SPHINCS: practical stateless hash-based signatures Daniel J. Bernstein

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-02 14:44:49
UPDATE