Error detection and correction

Results: 1767



#Item
451Post-quantum cryptography / Error detection and correction / Merkle signature scheme / Digital signature / Hash tree / Hash function / Electronic signature / Public key infrastructure / Digital Signature Algorithm / Cryptography / Public-key cryptography / Key management

Let Live and Let Die — Handling the State of Hash-based Signatures Stefan-Lukas Gazdag1 , Denis Butin2 , and Johannes Buchmann2 1

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-09 11:37:18
452Error detection and correction / Key management / Digital signature / Cryptographic hash function / Hash function / Hash tree / RSA / Lamport signature / Merkle signature scheme / Cryptography / Public-key cryptography / Hashing

SPHINCS: practical stateless hash-based signatures Daniel J. Bernstein1,3 , Daira Hopwood2 , Andreas Hülsing3 , Tanja Lange3 , Ruben Niederhagen3 , Louiza Papachristodoulou4 , Michael Schneider,

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-09 11:36:42
453Electronic engineering / Convolutional code / Orthogonal frequency-division multiplexing / Turbo code / Forward error correction / Channel code / MIMO / Interleaving / Symbol rate / Error detection and correction / Telecommunications engineering / Information

1 A Comparison of Convolutional and Turbo Coding Schemes For Broadband FWA Systems Ioannis A. Chatzigeorgiou, Miguel R. D. Rodrigues, Ian J. Wassell and Rolando Carrasco

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2007-06-29 06:52:43
454Documents / Technical communication / Comma-separated values / Ver / JAMA / Error detection and correction / Software / Technology / Computing / Components / Datasheet

PowerPoint プレゼンテーション

Add to Reading List

Source URL: www.japia.or.jp

Language: English - Date: 2014-09-17 22:01:21
455Error detection and correction / Search algorithms / Proof-of-work system / Lamport signature / Hash function / Hash tree / SHA-1 / Hash list / Trie / Cryptography / Cryptographic hash functions / Hashing

An (Almost) Constant-Effort Solution-Verification Proof-of-Work Protocol based on Merkle Trees (extended and colored version of [7]) Fabien Coelho ´ CRI, Ecole des mines de Paris,

Add to Reading List

Source URL: hashcash.org

Language: English - Date: 2008-06-22 07:14:34
456Hashing / MD5 / HMAC / SHA-2 / Collision attack / SHA-1 / Crypt / Merkle–Damgård construction / Hash function / Error detection and correction / Cryptographic hash functions / Cryptography

CIS 331 Introduction to Networks & Security January 23, 2014 Project 1: Attacking Cryptographic Hashes

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2014-11-18 15:19:13
457Group testing / Reed–Solomon error correction / Molecular biology / Finite fields / Coding theory / Error detection and correction / Combinatorics

Accurate Decoding of Pooled Sequenced Data Using Compressed Sensing Denisa Duma1 , Mary Wootters2 , Anna C. Gilbert2 , Hung Q. Ngo3 , Atri Rudra3 , Matthew Alpert1 , Timothy J. Close4 , Gianfranco Ciardo1 , and Stefano L

Add to Reading List

Source URL: www.cs.ucr.edu

Language: English - Date: 2013-07-18 13:27:18
458Electronics / High-definition television / Error detection and correction / Broadcasting / DVB / ISDB / DVB-T / Interleaving / Forward error correction / Digital television / Electronic engineering / Broadcast engineering

ATTACHMENT 3 MOBILE RECEPTION In the future, almost all the high-quality television programs will likely be provided via fiber to the home (FTTH) or satellite (BS, CS) networks. There is a strong requirement for terrest

Add to Reading List

Source URL: www.dibeg.org

Language: English - Date: 2014-12-14 19:33:35
459Identification / Identifiers / Universal identifiers / Financial regulation / Barcodes / Luhn algorithm / Working memory / RAM parity / International Securities Identification Number / Mind / Memory / Error detection and correction

A Memory Aid for Reduced Cognitive Load in Manually Entered Online Bank Transactions Frode Eika Sandnes Faculty of Technology, Art and Design Oslo and Akershus University College of Applied Sciences

Add to Reading List

Source URL: www.nik.no

Language: English - Date: 2013-01-14 08:46:48
460Software testing / Error detection and correction / Fuzz testing / Checksum / Cksum / Sum / Adler-32 / Hash function / Transmission Control Protocol / Computing / Software / System software

15 Checksum-Aware Fuzzing Combined with Dynamic Taint Analysis and Symbolic Execution TIELEI WANG and TAO WEI, Peking University GUOFEI GU, Texas A&M University WEI ZOU, Peking University

Add to Reading List

Source URL: lenx.100871.net

Language: English
UPDATE