Error function

Results: 718



#Item
191Statistics / Mathematical structures / Learning with errors / Machine learning / Error detection and correction / Public-key cryptography / Normal distribution / RSA / Hash function / Algebra / Mathematics / Cryptography

An improved compression technique for signatures based on learning with errors Shi Bai and Steven D. Galbraith Department of Mathematics, University of Auckland, New Zealand.

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-01-22 16:26:55
192Hashing / Error detection and correction / Digital signature / Hash tree / SHA-2 / SHA-1 / RSA / Hash function / Merkle signature scheme / Cryptography / Cryptographic hash functions / Public-key cryptography

One-Time Signatures Revisited: Have They Become Practical? Dalit Naor∗ Amir Shenhav† Avishai Wool‡

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-12-02 02:25:54
193Computer architecture / Classes of computers / Parallel computing / Information science / Error detection and correction / Hash function / Hash table / CPU cache / Trie / Computing / Search algorithms / Hashing

Department of Electrical and Computer Systems Engineering Technical Report MECSE

Add to Reading List

Source URL: www.ecse.monash.edu.au

Language: English - Date: 2007-11-19 17:29:34
194Search algorithms / Error detection and correction / MD5 / Collision resistance / Hash function / SHA-1 / Birthday attack / Collision / Quadratic probing / Cryptographic hash functions / Cryptography / Hashing

Chapter 6 Hash Functions A hash function usually means a function that compresses, meaning the output is shorter than the input. Often, such a function takes an input of arbitrary or almost arbitrary length to one whose

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2009-09-20 23:24:55
195Hashing / System software / Error detection and correction / Hash table / Hash function / Computer virus / Hash list / COM file / Ar / Computing / Search algorithms / Software

VIRUS BULLETIN www.virusbtn.com MALWARE ANALYSIS MAKING A HASH OF THINGS Peter Ferrie Microsoft, USA

Add to Reading List

Source URL: vxheaven.org

Language: English - Date: 2009-09-01 15:48:44
196Error function / Probability distribution / Probability / Mathematical analysis / Probability and statistics / Normal distribution

g01eac g01 – Simple Calculations on Statistical Data nag prob normal (g01eac) 1.

Add to Reading List

Source URL: www.softintegration.com

Language: English - Date: 2004-10-25 19:49:06
197Telecommunications engineering / Mathematics / Turbo code / Forward error correction / Concatenated error correction code / Trellis modulation / Linear code / Code rate / Puncturing / Error detection and correction / Information / Convolutional code

A Novel Technique To Evaluate the Transfer Function of Punctured Turbo Codes Ioannis Chatzigeorgiou, Miguel R. D. Rodrigues, Ian J. Wassell Rolando Carrasco

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2007-06-29 06:52:43
198Error detection and correction / Digital signature / Hash function / RSA / Lamport signature / Cryptography / Public-key cryptography / Key management

SPHINCS: practical stateless hash-based signatures Daniel J. Bernstein

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-02 14:44:49
199Electromagnetic radiation / Image processing / Aperture synthesis / AIPS++ / Point spread function / Optical aberration / Deconvolution / Optics / Interferometry / Atomic /  molecular /  and optical physics

PREAMBLE TO ERROR RECOGNITION and IMAGE ANALYSIS 2 • Why are these two topics in the same lecture?

Add to Reading List

Source URL: www.aoc.nrao.edu

Language: English
200Post-quantum cryptography / Error detection and correction / Merkle signature scheme / Digital signature / Hash tree / Hash function / Electronic signature / Public key infrastructure / Digital Signature Algorithm / Cryptography / Public-key cryptography / Key management

Let Live and Let Die — Handling the State of Hash-based Signatures Stefan-Lukas Gazdag1 , Denis Butin2 , and Johannes Buchmann2 1

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-09 11:37:18
UPDATE