Hash function

Results: 1800



#Item
151Cryptography / Public-key cryptography / Notary / Computer access control / Digital signature / Signature / Cryptographic hash function / Authentication / Seal / Commitment scheme / Secure multi-party computation / Challengeresponse authentication

The BiBa One-Time Signature and Broadcast Authentication Protocol  Adrian Perrig

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English - Date: 2015-06-01 09:06:14
152Hashing / Search algorithms / Statistical theory / Bloom filter / Bit array / Probability distributions / Hash function / Entropy / Golomb coding / KullbackLeibler divergence / Birthday problem

CS 493: Algorithms for Massive Data Sets Feb 21, Local Models, Bloom Filter

Add to Reading List

Source URL: www.cs.princeton.edu

Language: English - Date: 2002-03-15 13:15:13
153Hashing / Information retrieval / Information science / Search algorithms / Hash table / Universal hashing / Linear probing / SUHA / Hash function / Double hashing / Open addressing / Rolling hash

Microsoft PowerPoint - lecture7_HashingIII.pptx

Add to Reading List

Source URL: courses.csail.mit.edu

Language: English - Date: 2011-03-31 12:24:54
154Computer arithmetic / Modular arithmetic / Central processing unit / Search algorithms / Exponentials / Exponentiation by squaring / Montgomery modular multiplication / Hash function / Processor register / 64-bit computing / Euclidean vector

Optimizing M AKWA on GPU and CPU Thomas Pornin, <> May 18, 2015 Abstract We present here optimized implementations of the M AKWA password hashing

Add to Reading List

Source URL: www.bolet.org

Language: English - Date: 2015-09-06 14:08:28
155Search algorithms / Information retrieval / Information science / Hashing / Mathematics / Mathematical optimization / Operations research / Arrays / Hash table / Hash function / Universal hashing / Dynamic programming

October 17, Fall 2007 Quiz 1 Solutions Introduction to Algorithms Massachusetts Institute of Technology

Add to Reading List

Source URL: courses.csail.mit.edu

Language: English - Date: 2009-05-07 21:09:16
156NIST hash function competition / Cryptography / Skein / SHA-3 / SHA-2 / Grstl / JH / Cryptographic hash function / BLAKE / 64-bit computing / X86-64 / MD6

sphlib Update for the SHA-3 Third-Round Candidates Thomas Pornin, <> July 20, 2011 Abstract sphlib[1] is an open-source library of hash function implementations, in both C and Java, including

Add to Reading List

Source URL: www.bolet.org

Language: English - Date: 2015-09-06 14:06:03
157Hashing / Information retrieval / Information science / Search algorithms / Hash table / Open addressing / Linear probing / Quadratic probing / Hash function / Double hashing / Cryptographic hash function / Hash

6.006 Intro to Algorithms Recitation 05 February 16, 2011

Add to Reading List

Source URL: courses.csail.mit.edu

Language: English - Date: 2011-02-16 17:35:41
158Mathematics / Search algorithms / Binary trees / Mathematical analysis / Combinatorics / Analysis of algorithms / Asymptotic analysis / Big O notation / Mathematical notation / Self-balancing binary search tree / Hash function / Hash table

October 17, Fall 2007 Quiz 1 Introduction to Algorithms Massachusetts Institute of Technology

Add to Reading List

Source URL: courses.csail.mit.edu

Language: English - Date: 2009-05-12 11:12:56
159Cryptography / Cryptanalysis / Chosen-ciphertext attack / Block cipher / Data Encryption Standard / Chosen-plaintext attack / Strong cryptography / Cryptographic hash function / Known-plaintext attack / Key / Ciphertext-only attack / Ciphertext

Cryptanalytic Tools Authors: Prof. Dr.-Ing. Tim Güneysu Dipl. Ing. Alexander Wild B. Sc. Tobias Schneider

Add to Reading List

Source URL: www.nds.rub.de

Language: English - Date: 2015-12-11 07:25:27
160Search algorithms / Classes of computers / Battleship / Gaming / Binary search algorithm / Hash function / Software

Microsoft Word - unpluggedDec2006-1.doc

Add to Reading List

Source URL: swaygrantham.co.uk

Language: English - Date: 2014-07-05 03:36:49
UPDATE