Function key

Results: 1153



#Item
251Information science / Artificial intelligence / Hash function / Universal hashing / Hash table / Perfect hash function / Cryptographic hash function / Linear probing / Tabulation hashing / Hashing / Search algorithms / Information retrieval

Dictionaries and Hashing recap  A dynamic dictionary stores (key, value)-pairs and supports: add(key, value), lookup(key) (which returns value) and delete(key) Advanced Algorithms – COMS31900

Add to Reading List

Source URL: www.cs.bris.ac.uk

Language: English - Date: 2014-03-11 09:18:18
252Hashing / Search algorithms / MD5 / X.509 / Simple public key infrastructure / Hash function / HMAC / Cryptographic hash function / Crypt / Cryptography / Public-key cryptography / Key management

Pisces User Manual Release 1.0 alpha 1 Jeremy Hylton April 27, 2000 Corporation for National Research Initiatives

Add to Reading List

Source URL: www.cnri.reston.va.us

Language: English - Date: 2013-05-09 14:48:28
253Advantage / Pseudorandom function family / Pseudorandom permutation / Function / Permutation / Randomized algorithm / Unpredictable permutation / Cryptography / Mathematics / Pseudorandomness

Chapter 3 Pseudorandom Functions Pseudorandom functions (PRFs) and their cousins, pseudorandom permutations (PRPs), figure as central tools in the design of protocols, especially those for shared-key cryptography. At one

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2009-09-20 20:41:44
254Computing / MD5 / HMAC / Cryptographic hash function / MD2 / Md5sum / Public key fingerprint / Fingerprint / Checksum / Cryptography / Error detection and correction / Hashing

Perl versiondocumentation - Digest::MD5 NAME Digest::MD5 - Perl interface to the MD5 Algorithm SYNOPSIS

Add to Reading List

Source URL: perldoc.perl.org

Language: English - Date: 2014-10-03 15:19:29
255Numerical linear algebra / Matrix theory / Fictional technology / Matrix of Leadership / Matrix / Stock-keeping unit / Function key / Algebra / Linear algebra / Mathematics

POS International, Inc. Matrix Module Matrix Module Installation: 1.

Add to Reading List

Source URL: www.posintl.com

Language: English - Date: 2009-02-20 04:42:06
256Technology / Cryptographic protocols / Computing / Key management / Secure communication / Temporal Key Integrity Protocol / Wireless security / Distributed coordination function / Wi-Fi / Wireless networking / IEEE 802.11 / Cryptography

Advanced Wi-Fi Attacks Using Commodity Hardware Mathy Vanhoef Frank Piessens iMinds-DistriNet

Add to Reading List

Source URL: people.cs.kuleuven.be

Language: English - Date: 2014-12-05 07:10:36
257Graphical user interfaces / Menu bar / GUI widget / Title bar / Mouse / Control key / Window function / Button / Levenberg–Marquardt algorithm / Software / System software / Human–computer interaction

PRESENTATION OF THE COLEGRAM SOFTWARE Marie-Christine Lépy 1

Add to Reading List

Source URL: www.nucleide.org

Language: English - Date: 2007-08-28 10:46:33
258Symmetric-key algorithm / Cryptographic hash function / Authenticated encryption / Cipher / Public-key cryptography / Random oracle / Cryptography / Encryption / Advanced Encryption Standard

ACISP 2015 Accepted papers Australasian Conference on Information Security and Privacy Queensland University of Technology, Gardens Point, Brisbane www.acisp2015.qut.edu.au Paper

Add to Reading List

Source URL: www.acisp2015.qut.edu.au

Language: English - Date: 2015-04-12 20:54:57
259Hash function / Information retrieval / Artificial intelligence / Information science / Cryptography / Cryptographic hash function / Message authentication codes / Hashing / HMAC

############################################################## Keyed-Hash Message Authentication Code (HMAC) Hashlen = 224 ############################################################## Key length = 64

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-08-08 12:49:28
260Surveillance / Point of sale / Retailing / Computer keyboard / Function key / Technology / Electronics / Keystroke dynamics / Business / Embedded systems / Business software

Quick Start Guide In this Guide • Software Installation • Security Issues

Add to Reading List

Source URL: www.keystrokepos.com

Language: English - Date: 2011-12-12 14:58:44
UPDATE