Error detection and correction

Results: 1767



#Item
591Computer security / Cryptographic software / Virtual LAN / Critical Security Parameter / Password / FIPS 140 / HMAC / SHA-1 / Cryptography / Cryptography standards / Error detection and correction

Microsoft Word - 3e-636M-HSE FIPS Security Policy version 1-3

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-03-11 11:28:45
592MD5 / Hashing / MD2 / Crypt / Type system / Cryptography / Error detection and correction / MD4

Network Working Group Request for Comments: 1320 Obsoletes: RFC 1186 R. Rivest MIT Laboratory for Computer Science

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2002-03-27 15:08:34
593Hashing / Key management / PBKDF2 / SHA-2 / HMAC / Crypt / MD5 / Password / Key / Cryptography / Error detection and correction / Cryptographic hash functions

MBS Xojo Encryption Kit
 Version 1.0, © [removed]by Christian Schmitz About the MBS Xojo Encryption Kit 2

Add to Reading List

Source URL: www.monkeybreadsoftware.de

Language: English - Date: 2015-03-17 06:27:44
594Data / Standard RAID levels / Data corruption / ZFS / Error detection and correction / Parity bit / Data recovery / Disk storage / Disk sector / RAID / Computing / Information

Parity Lost and Parity Regained Andrew Krioukov∗, Lakshmi N. Bairavasundaram∗ , Garth R. Goodson†, Kiran Srinivasan†, Randy Thelen† , Andrea C. Arpaci-Dusseau∗ , Remzi H. Arpaci-Dusseau∗ † ∗ University

Add to Reading List

Source URL: ed-thelen.org

Language: English - Date: 2010-08-06 18:35:28
595Mathematics / Applied mathematics / Viterbi algorithm / Convolutional code / Sequential decoding / Iterative Viterbi decoding / Hidden Markov model / Dynamic programming / Expectation–maximization algorithm / Error detection and correction / Markov models / Statistics

Iterative Viterbi A* Algorithm for K-Best Sequential Decoding Zhiheng Huang† , Yi Chang, Bo Long, Jean-Francois Crespo† , Anlei Dong, Sathiya Keerthi and Su-Lin Wu Yahoo! Labs 701 First Avenue, Sunnyvale CA 94089, US

Add to Reading List

Source URL: www.yichang-cs.com

Language: English - Date: 2012-05-07 21:32:35
596Computer hardware / Typing / Mode / LetterWise / Error detection and correction / User error / Error message / Words per minute / Typographical error / Input/output / Technology / Computing

Eyes-free Text Entry with Error Correction on Touchscreen Mobile Devices

Add to Reading List

Source URL: www.yorku.ca

Language: English - Date: 2010-10-21 05:27:39
597SHA-2 / SHA-1 / MD4 / NIST hash function competition / MD5 / RIPEMD / Hash function / Secure Hash Standard / Crypt / Cryptographic hash functions / Error detection and correction / Cryptography

On the Computational Asymmetry of the S-boxes Present in Blue Midnight Wish Cryptographic Hash Function Danilo Gligoroski1 and Vlastimil Klima2 1 Department of Telematics, Norwegian University of Science and Technology,

Add to Reading List

Source URL: cryptography.hyperlink.cz

Language: English - Date: 2010-04-18 07:19:47
598Arithmetic / Mathematical notation / Summation / Error detection and correction / Finite fields / BCH code / AN codes / Mathematics / Mathematical analysis / Abstract algebra

Microsoft Word - PMcc3ATest

Add to Reading List

Source URL: www.singaporemath.com

Language: English - Date: 2014-10-31 18:02:55
599Writing / Barcodes / Information / International Standard Audiovisual Number / Error detection and correction / ISO 15706-2 / Check digit / Security / Isan / Identifiers / Universal identifiers / ISO standards

ISAN Check Characters Calculation ISAN-IA 30, rue de Saint Jean CH-1203 Geneva Switzerland Tel: +[removed]

Add to Reading List

Source URL: www.isan.org

Language: English - Date: 2011-05-02 12:05:27
600Hashing / Search algorithms / Hash function / Preimage attack / SHA-1 / Collision attack / HMAC / SHA-2 / Merkle–Damgård construction / Cryptographic hash functions / Cryptography / Error detection and correction

Generic collision attacks on narrow-pipe hash functions faster than birthday paradox, applicable to MDx, SHA-1, SHA-2, and SHA-3 narrow-pipe candidates Vlastimil Klima1 and Danilo Gligoroski2 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-08-04 14:03:01
UPDATE