Error function

Results: 718



#Item
421NIST hash function competition / SHA-2 / Advanced Encryption Standard process / SHA-1 / Secure Hash Standard / Hash function / SANDstorm hash / Cryptographic hash functions / Error detection and correction / Cryptography

What hash functions were based on block ciphers

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:10:16
422Error detection and correction / Cryptography / Information retrieval / Computing / Hash function / Hash table / Associative array / Hash list / Comparison of programming languages / Hashing / Search algorithms / Cryptographic hash functions

Package ‘hash’ July 2, 2014 Type Package Title Full feature implementation of hash/associated arrays/dictionaries Version[removed]Date[removed]

Add to Reading List

Source URL: cran.r-project.org

Language: English - Date: 2014-07-02 12:06:36
423Error detection and correction / Search algorithms / Hash function / Hash tree / Hash list / SHA-1 / SHA-2 / Trie / Hash chain / Cryptographic hash functions / Cryptography / Hashing

Efficient Record-Level Keyless Signatures for Audit Logs Ahto Buldas1 , Ahto Truu1 , Risto Laanoja1 , and Rainer Gerhards2 1 Guardtime AS, Tallinn, Estonia {ahto.buldas,ahto.truu,risto.laanoja}@guardtime.com

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-07-15 10:18:50
424Gaussian function / Data analysis / Normal distribution / Standard deviation / Folded normal distribution / 68-95-99.7 rule / Statistics / Mathematical analysis / Error function

Relating Φ and erf There’s nothing profound here, just simple but error-prone calculations that I’ve done so often that I decided to save the results. Let Φµ,σ (x) be the CDF of a normal random variable with mea

Add to Reading List

Source URL: www.johndcook.com

Language: English - Date: 2013-07-09 18:21:20
425Combinatorial optimization / Functional analysis / Measure theory / Weight function / Prevalence / Standard error / Mathematical analysis / Statistics / Mathematics

Number and Percentage of Households with NSCSHCN

Add to Reading List

Source URL: www.fv-ncfpp.org

Language: English - Date: 2011-04-27 07:34:37
426Atmospheric sciences / Moderate-Resolution Imaging Spectroradiometer / Remote sensing / Greenhouse Gases Observing Satellite / 3D computer graphics / Astrophysics / Bidirectional reflectance distribution function / Spectralon / Reflectivity / Optics / Earth / Radiometry

IEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING, VOL. 52, NO. 7, JULY[removed]Long-Term Vicarious Calibration of GOSAT Short-Wave Sensors: Techniques for Error

Add to Reading List

Source URL: oco.jpl.nasa.gov

Language: English - Date: 2014-09-16 18:07:22
427Combinatorial optimization / Functional analysis / Measure theory / Weight function / Prevalence / Standard error / Mathematical analysis / Statistics / Mathematics

Number and Percentage of Households with NSCSHCN

Add to Reading List

Source URL: www.childhealthdata.org

Language: English - Date: 2015-02-26 03:03:02
428Combinatorial optimization / Functional analysis / Measure theory / Weight function / Prevalence / Standard error / Mathematical analysis / Statistics / Mathematics

Number and Percentage of Households with NSCSHCN

Add to Reading List

Source URL: childhealthdata.org

Language: English - Date: 2015-02-26 03:03:02
429Error detection and correction / HTTP clients / Hashing / Hash list / SHA-1 / Wget / CURL / Hash function / Metalink / Software / Computing / Cryptographic hash functions

Package ‘downloader’ July 2, 2014 Maintainer Winston Chang Author Winston Chang Version 0.3 License GPL-2

Add to Reading List

Source URL: cran.r-project.org

Language: English - Date: 2014-07-02 11:40:07
430Message authentication codes / Cryptographic hash functions / Internet protocols / HMAC / HOTP / SHA-1 / Collision attack / Hash function / Wang Xiaoyun / Cryptography / Error detection and correction / Hashing

SHA-1 & HMAC OTP Frequently Asked Questions Recently, there has been considerable coverage in the press about an upcoming paper from Academics in China that describes an attack on SHA-1. OATH is providing this overview a

Add to Reading List

Source URL: www.openauthentication.org

Language: English - Date: 2013-11-05 02:27:57
UPDATE