Error function

Results: 718



#Item
121Search algorithms / Software engineering / Biology / Cell biology / Error detection and correction / Hash function / Garbage collection / Information Processing Language / Reference / Computing / Data types / Primitive types

PDF Document

Add to Reading List

Source URL: www.slac.stanford.edu

Language: English - Date: 2011-07-15 17:11:52
122Civil law / Digital signature / Key management / Post-quantum cryptography / Hash function / Stateless / Cyberwarfare / Applied mathematics / Cryptography / Public-key cryptography / Error detection and correction

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-02 14:46:07
123Luby transform code / Erasure code / Forward error correction / Cryptographic hash function / Reed–Solomon error correction / Hash function / Decoder / Digital signature / Systematic code / Coding theory / Error detection and correction / Cryptography

PDF Document

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2004-11-17 13:32:22
124Public-key cryptography / Error detection and correction / Merkle signature scheme / Digital signature / Hash function / Hash tree / Collision attack / RSA / MD5 / Cryptography / Hashing / Cryptographic hash functions

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-09 11:38:04
125Classes of computers / Compaq Presario / Compaq / Hewlett-Packard / Device driver / Computing / IBM PC compatibles / Computer hardware

Compaq Presario Driver Device Driver Hoping to use the card maybe tough. Forgetting to have your manager submited, means you has to automatically seek the particular error. Any time help function was truly enhanced, nume

Add to Reading List

Source URL: www.etf.ee

Language: English - Date: 2014-12-09 16:54:12
126Computer programming / Search algorithms / Compiler construction / Error detection and correction / Hash function / Cryptographic hash function / Hash table / Lexical analysis / Parsing / Computing / Software engineering / Hashing

Code Similarity Detection in Multiple Large Source Trees using Token Hashes Dr. Warren Toomey School of IT, Bond University Queensland. Australia

Add to Reading List

Source URL: minnie.tuhs.org

Language: English - Date: 2011-12-11 22:34:52
127Error detection and correction / Public-key cryptography / Hash function / XTR / RSA / Prime number / MD5 / Collision resistance / Cryptography / Finite fields / Mathematics

On the Possibility of Constructing Meaningful Hash Collisions for Public Keys Arjen Lenstra1,2 and Benne de Weger2 1 Lucent Technologies, Bell Laboratories, Room 2T-504

Add to Reading List

Source URL: www.win.tue.nl

Language: English - Date: 2005-07-13 08:18:19
128Error detection and correction / Cryptography / Information retrieval / Computing / Hash table / Hash function / Rainbow table / NTLM / Hash / Search algorithms / Hashing / Cryptographic hash functions

Advancements in TMTOs Steve Thomas “Sc00bz” Passwords^12 TobTu.com/passwords12 1

Add to Reading List

Source URL: passwords12.at.ifi.uio.no

Language: English - Date: 2012-12-06 12:19:04
129Error detection and correction / Search algorithms / Hash function / MD5 / Collision / SHA-1 / Hash list / Claw-free permutation / Collision attack / Cryptographic hash functions / Cryptography / Hashing

Secure Names for Bit-Strings Stuart Haber* W. Scott Stornetta*

Add to Reading List

Source URL: nakamotoinstitute.org

Language: English - Date: 2014-03-23 11:44:47
130Computer programming / Mathematics / Hashing / Search algorithms / Error detection and correction / Space–time tradeoff / CPU cache / Dynamic random-access memory / Hash function / Computing / Software optimization / Computer memory

Fast and Tradeoff-Resilient Memory-Hard Functions for Cryptocurrencies and Password Hashing Alex Biryukov University of Luxembourg

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-06 04:22:19
UPDATE