Error function

Results: 718



#Item
621Preimage attack / Collision attack / HMAC / SHA-2 / Hash function / SMASH / MD5 / SHA-1 / One-way function / Cryptographic hash functions / Cryptography / Error detection and correction

SMASH - A Cryptographic Hash Function Lars R. Knudsen Department of Mathematics, Technical University of Denmark

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-05-26 16:47:31
622Information retrieval / Error detection and correction / Information / Hash table / Hash function / Trie / Extendible hashing / Cryptographic hash function / B-tree / Information science / Search algorithms / Hashing

Extendible Hashing-A Fast Access Method for Dynamic Files

Add to Reading List

Source URL: www.informatik.uni-jena.de

Language: English - Date: 2005-11-08 01:51:24
623Search algorithms / Error detection and correction / Pseudorandom function family / Hash function / Random oracle / Optimal asymmetric encryption padding / Feistel cipher / Collision resistance / Advantage / Cryptography / Cryptographic hash functions / Hashing

A preliminary version appears at ICALP, Lecture Notes in Computer Science, Springer-Verlag, [removed]Robust Multi-Property

Add to Reading List

Source URL: homepages.cwi.nl

Language: English - Date: 2008-08-14 09:00:13
624Statistical theory / Means / Weighted mean / Statistical inference / Variance / Weight function / Sample mean and sample covariance / Mean / Estimator / Statistics / Mathematical analysis / Summary statistics

Weighted Standard Error and its Impact on Significance Testing (WinCross vs. Quantum & SPSS) Dr. Albert Madansky

Add to Reading List

Source URL: www.analyticalgroup.com

Language: English - Date: 2010-12-15 10:33:28
625Autocorrelation / Correlogram / Autocovariance / Correlation function / Standard error / Correlation and dependence / Covariance function / Autoregressive model / Durbin–Watson statistic / Statistics / Covariance and correlation / Time series analysis

3 Autocorrelation Autocorrelation refers to the correlation of a time series with its own past and future values. Autocorrelation is also sometimes called “lagged correlation” or “serial correlation”, which

Add to Reading List

Source URL: www.ltrr.arizona.edu

Language: English - Date: 2012-12-26 12:43:55
626Hashing / Preimage attack / SHA-1 / MD5 / NIST hash function competition / Collision resistance / Crypt / HMAC / SHA-2 / Error detection and correction / Cryptography / Cryptographic hash functions

The Hitchhiker's Guide to the SHA-3 Competition

Add to Reading List

Source URL: www.cs.technion.ac.il

Language: English - Date: 2012-07-04 01:21:00
627Hashing / NIST hash function competition / Message authentication codes / MD6 / Collision resistance / HMAC / Preimage attack / Hash function / Collision attack / Cryptography / Error detection and correction / Cryptographic hash functions

The MD6 hash function A proposal to NIST for SHA-3 Ronald L. Rivest

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2008-10-27 11:58:57
628Coding theory / Error detection and correction / Finite fields / Polynomials / Orthogonal polynomials / Reed–Solomon error correction / Chebyshev polynomials / BCH code / Rational function / Abstract algebra / Mathematics / Algebra

Highly resilient correctors for polynomials Peter Gemmell

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2010-08-08 13:44:04
629Error detection and correction / Key management / Merkle signature scheme / Cryptographic hash function / Digital signature / Hash tree / Key generation / Cryptographically secure pseudorandom number generator / Trie / Cryptography / Public-key cryptography / Hashing

Merkle Signatures with Virtually Unlimited Signature Capacity Johannes Buchmann1 , Erik Dahmen1 , Elena Klintsevich1 ,

Add to Reading List

Source URL: www.cdc.informatik.tu-darmstadt.de

Language: English - Date: 2007-07-10 07:26:05
630Provably secure cryptographic hash function / Preimage attack / Universal one-way hash function / Hash function / Collision resistance / SHA-1 / Rainbow table / Crypt / Hash list / Cryptographic hash functions / Cryptography / Error detection and correction

Provably Secure Cryptographic Hash Functions

Add to Reading List

Source URL: web.maths.unsw.edu.au

Language: English - Date: 2006-12-20 22:26:42
UPDATE