Error function

Results: 718



#Item
481Preimage attack / Advantage / SHA-1 / SHA-2 / Random oracle / Hash function / Grøstl / One-way compression function / Cryptography / Cryptographic hash functions / Error detection and correction

SHA-3 Conference, March 2012, Provable Security of BLAKE with Non-Ideal Commpressio Function

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 15:14:18
482Statistical theory / Estimation theory / Statistical models / Linear regression / Errors-in-variables models / Semiparametric regression / Instrumental variable / Loss function / Parametric model / Statistics / Regression analysis / Econometrics

Variable selection in measurement error models

Add to Reading List

Source URL: www.stat.tamu.edu

Language: English - Date: 2010-02-17 09:59:50
483Preimage attack / Keccak / SHA-1 / SHA-2 / Collision resistance / Random oracle / Grøstl / MD5 / Hash function / Cryptography / Cryptographic hash functions / Error detection and correction

SHA-3 Conference, March 2012, Security Analysis and Commparison of the SHA-3 Finalists

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 14:31:40
484NIST hash function competition / Hashing / Message authentication codes / Keccak / SHA-2 / HMAC / SHA-1 / Skein / JH / Error detection and correction / Cryptography / Cryptographic hash functions

SHA-3 Conference, March 2012, Side Channel Analysis of the SHA-3 Finalists

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 15:22:44
485Computing / Search algorithms / Data / Cryptographic hash functions / Hash function / MongoDB / Hash list / Data management / Error detection and correction / Hashing

Data distribution Introduction to MongoDB Will LaForest Senior Director of 10gen Federal [removed]

Add to Reading List

Source URL: files.meetup.com

Language: English - Date: 2012-12-11 23:15:33
486Error detection and correction / Search algorithms / SHA-2 / SHA-1 / MD5 / Collision / Hash function / Crypt / Digital signature / Cryptography / Cryptographic hash functions / Hashing

Microsoft Word - LE-Hashing-Analysis-WERB-r10.doc

Add to Reading List

Source URL: www.nsrl.nist.gov

Language: English - Date: 2006-06-05 17:00:20
487Cryptographic hash functions / Search algorithms / Bloom filter / Hash function / Fingerprint / Crypt / Rabin fingerprint / SHA-1 / Feature selection / Cryptography / Hashing / Error detection and correction

Chapter 8 DATA FINGERPRINTING WITH SIMILARITY DIGESTS Vassil Roussev Abstract

Add to Reading List

Source URL: roussev.net

Language: English - Date: 2013-07-17 18:45:01
488Search algorithms / Error detection and correction / Hash function / Crypt / Secure Hash Standard / SHA-2 / NIST hash function competition / Cryptography / Cryptographic hash functions / Hashing

mstockstill on PROD1PC70 with NOTICES Federal Register / Vol. 72, No[removed]Tuesday, January 23, [removed]Notices or through the email hotline – vietnam– texapp-monitor–[removed]. PRODUCT COVERAGE: The

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:28:18
489SHA-2 / SHA-1 / Crypt / Hash function / Transport Layer Security / Error detection and correction / Cryptographic hash functions / Cryptography

The Secure Hash Algorithm Validation System (SHAVS) Updated: May 21, 2014 Created: July 22, 2004 Lawrence E. Bassham III

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-05-21 09:13:37
490Computer programming / Software engineering / Search algorithms / Spam filtering / Cryptographic hash functions / Bloom filter / Hash function / Type I and type II errors / G factor / Hashing / Computing / Error detection and correction

doi:[removed]j.diin[removed]

Add to Reading List

Source URL: roussev.net

Language: English - Date: 2013-07-17 18:45:01
UPDATE