Error detection and correction

Results: 1767



#Item
481Hashing / Hash function / MD5 / SHA-1 / Collision resistance / Collision / One-way compression function / Merkle–Damgård construction / Cryptographic hash functions / Error detection and correction / Cryptography

CS255: Cryptography and Computer Security Winter 2007 Assignment #2 Due: Friday, Feb. 23, 2007.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2007-02-17 22:43:38
482Biometrics / Fingerprints / Search algorithms / Error detection and correction / Rabin fingerprint / Public key fingerprint / Hash function / Cryptographic hash function / SHA-1 / Cryptography / Information science / Information

WWWTrack: Data Mining Session: Similarity Search Detecting Near-Duplicates for Web Crawling Arvind Jain

Add to Reading List

Source URL: www-scf.usc.edu

Language: English - Date: 2012-11-10 17:20:30
483Error detection and correction / Message authentication codes / Hash function / ElGamal signature scheme / Hash tree / Digital signature / Collision resistance / One-way compression function / Lamport signature / Cryptography / Cryptographic hash functions / Hashing

CS255: Cryptography and Computer Security Winter 1999 Assignment #3

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 1999-02-22 15:26:53
484Hashing / Hash function / MD5 / SHA-1 / Collision resistance / Collision / One-way compression function / Merkle–Damgård construction / Cryptographic hash functions / Error detection and correction / Cryptography

CS255: Cryptography and Computer Security Winter 2008 Assignment #2 Due: Friday, Feb. 22, 2008.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2008-02-20 19:40:28
485Bioinformatics / Probability and statistics / Error detection and correction / Dynamic programming / Hidden Markov model / Hierarchical hidden Markov model / Markov chain / Speech recognition / Viterbi algorithm / Statistics / Markov models / Machine learning

Incremental Construction of Structured Hidden Markov Models Hidden Markov Model, Sequence Analysis, Data Mining Abstract This paper presents an algorithm for inferring a Structured Hidden Markov Model (S-HMM) from

Add to Reading List

Source URL: www.ugogalassi.net

Language: English - Date: 2006-06-29 20:22:04
486Mathematics / Algebra / Finite fields / Polynomials / List decoding / Reed–Solomon error correction / BCH code / Berlekamp–Massey algorithm / Linear code / Abstract algebra / Coding theory / Error detection and correction

Improved Decoding of Reed-Solomon and Algebraic-Geometry Codes Venkatesan Guruswami Madhu Sudan

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2010-08-13 15:03:38
487Hashing / Error detection and correction / Hash function / ElGamal signature scheme / Hash tree / Digital signature / Collision resistance / RSA / One-way compression function / Cryptography / Cryptographic hash functions / Public-key cryptography

CS255: Cryptography and Computer Security Winter 2000 Assignment #3

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2000-02-14 15:44:45
488Error detection and correction / Hash function / Transmission Control Protocol / One-way compression function / CBC-MAC / Cryptography / Hashing / Cryptographic hash functions

CS255: Cryptography and Computer Security Winter 2005 Assignment #2 Due: Wednesday, February 16th, 2005.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2005-02-08 17:18:01
489Error detection and correction / Public-key cryptography / Hash function / Digital signature / RSA / Hash tree / Collision resistance / One-way compression function / UMAC / Cryptography / Cryptographic hash functions / Hashing

CS255: Cryptography and Computer Security Winter 2000 Assignment #3

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2001-02-28 17:43:23
490Error detection and correction / Search algorithms / Hash tree / Hash list / Hash function / SHA-1 / Hash table / Lamport signature / Cryptographic hash functions / Hashing / Cryptography

Optimal Parameter Selection for Efficient Memory Integrity Verification Using Merkle Hash Trees Dan Williams and Emin G¨un Sirer {djwill, egs}@cs.cornell.edu Department of Computer Science Cornell University

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2005-03-20 00:13:33
UPDATE