Error function

Results: 718



#Item
261Search algorithms / Computing / Cryptography / Computer programming / Information retrieval / Hash function / Hash tree / SHA-1 / Bin / Hashing / Cryptographic hash functions / Error detection and correction

CADS: Continuous Authentication on Data Streams Stavros Papadopoulos Yin Yang Dimitris Papadias

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2014-03-08 19:35:50
262Signal processing / Pedotransfer function / Soil / Mean squared error / Forecasting / Root-mean-square deviation / Parameter / Statistics / Estimation theory / Statistical inference

Hydrol. Earth Syst. Sci., 15, 2437–2457, 2011 www.hydrol-earth-syst-sci.netdoi:hess © Author(sCC Attribution 3.0 License. Hydrology and

Add to Reading List

Source URL: www.hydrol-earth-syst-sci.net

Language: English - Date: 2014-12-04 02:55:12
263Theoretical computer science / Applied mathematics / Error detection and correction / Quantum key distribution / Computer arithmetic / Cryptographic hash function / Hash function / Hamming / MD5 / Cryptography / Quantum information science / Quantum cryptography

3-7 Error Detection and Authentication in Quantum Key Distribution YAMAMURA Akihiro and ISHIZUKA Hirokazu Detecting errors in a raw key and authenticating a private key are crucial for quantum key distribution schemes. O

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2013-11-21 18:58:38
264Entropy / SHA-2 / Preimage attack / SHA-1 / Hash function / HMAC / Padding / NIST hash function competition / Leftover hash lemma / Cryptographic hash functions / Error detection and correction / Cryptography

Paragraph[removed]of the Code of Ethics Estate agents and salespersons should be fully conversant with the EAO, its subsidiary legislation, this Code of Ethics, and other guidelines issued by the EAA from time to time and

Add to Reading List

Source URL: text.eaa.org.hk

Language: English - Date: 2013-07-22 00:20:20
265Entropy / SHA-2 / Preimage attack / SHA-1 / Hash function / HMAC / Padding / NIST hash function competition / Leftover hash lemma / Cryptographic hash functions / Error detection and correction / Cryptography

Why narrow-pipe cryptographic hash functions are not a match to wide-pipe cryptographic hash functions? Danilo Gligoroski [removed] Faculty of Information Technology, Mathematics and Electrical Engin

Add to Reading List

Source URL: cryptography.hyperlink.cz

Language: English - Date: 2010-12-04 13:55:47
266Information science / Artificial intelligence / Error detection and correction / Hash functions / Hash table / Cryptographic hash functions / Trie / Linked list / Perfect hash function / Hashing / Search algorithms / Information retrieval

VISUAL BASIC COLLECTIONS AND HASH TABLES Thomas Niemann Preface

Add to Reading List

Source URL: epaperpress.com

Language: English - Date: 2014-07-10 21:19:43
267Hashing / System software / Error detection and correction / Hash table / Hash function / Computer virus / Hash list / COM file / Ar / Computing / Search algorithms / Software

VIRUS BULLETIN www.virusbtn.com MALWARE ANALYSIS MAKING A HASH OF THINGS Peter Ferrie Microsoft, USA

Add to Reading List

Source URL: pferrie.host22.com

Language: English - Date: 2011-09-27 17:18:26
268Analytic functions / PV-Wave / Error function / Gamma function / C standard library / Fortran / Bessel function / Elliptic integral / Mathematical analysis / Special functions / Array programming languages

Doc-To-Help Standard Template

Add to Reading List

Source URL: www.absoft.com

Language: English - Date: 2013-05-30 11:24:41
269SHA-2 / SHA-1 / MD4 / NIST hash function competition / MD5 / RIPEMD / Hash function / Secure Hash Standard / Crypt / Cryptographic hash functions / Error detection and correction / Cryptography

On the Computational Asymmetry of the S-boxes Present in Blue Midnight Wish Cryptographic Hash Function Danilo Gligoroski1 and Vlastimil Klima2 1 Department of Telematics, Norwegian University of Science and Technology,

Add to Reading List

Source URL: cryptography.hyperlink.cz

Language: English - Date: 2010-04-18 07:19:47
270Hashing / Search algorithms / Hash function / Preimage attack / SHA-1 / Collision attack / HMAC / SHA-2 / Merkle–Damgård construction / Cryptographic hash functions / Cryptography / Error detection and correction

Generic collision attacks on narrow-pipe hash functions faster than birthday paradox, applicable to MDx, SHA-1, SHA-2, and SHA-3 narrow-pipe candidates Vlastimil Klima1 and Danilo Gligoroski2 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-08-04 14:03:01
UPDATE