Hash function

Results: 1800



#Item
171

RC4-Hash : A New Hash Function based on RC4 (Extended Abstract) Donghoon Chang1 , Kishan Chand Gupta2 , and Mridul Nandi3 1 2

Add to Reading List

Source URL: www.isical.ac.in

Language: English - Date: 2011-12-28 03:46:39
    172Cryptographic hash functions / NIST hash function competition / SHA-3

    SHA-3 Conference, February 2009, Shabal

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2012-06-05 11:30:32
    173Cryptography / Cryptographic hash functions / Hashing / NIST hash function competition / SHA-3 / Secure Hash Algorithm / SHA-2 / SHA-1 / Hash-based message authentication code / Secure Hash Standard / Sponge function / Hash function

    SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions

    Add to Reading List

    Source URL: nvlpubs.nist.gov

    Language: English - Date: 2015-08-04 11:34:10
    174

    Efficiency and Pseudo-Randomness of a Variant of Z´emor-Tillich Hash Function (Invited Paper) Christophe Petit Nicolas Veyrat-Charvillon

    Add to Reading List

    Source URL: www.uclouvain.be

    Language: English - Date: 2011-12-14 05:30:34
      175

      Hash Function Workshop Barcelona, May 24-25, 2007 Hash Function Workshop Promising new hash constructions?

      Add to Reading List

      Source URL: fse2007.uni.lu

      - Date: 2007-05-23 09:25:58
        176Cryptocurrencies / Bitcoin / Alternative currencies / Computing / E-commerce / Currency / Bitcoin network / Hashing / B-tree / Blockchain / Cryptographic hash function / Draft:Viccoin:APeer-to-PeerDigital Currency System

        Secure High-Rate Transaction Processing in Bitcoin Yonatan Sompolinsky1 and Aviv Zohar1,2 1 School of Engineering and Computer Science,

        Add to Reading List

        Source URL: fc15.ifca.ai

        Language: English - Date: 2015-01-11 00:33:39
        177

        Hard and easy Components of Collision Search in the Z´ emor-Tillich Hash Function: new Attacks and Reduced Variants with Equivalent Security Christophe Petit1? , Jean-Jacques Quisquater1 ,

        Add to Reading List

        Source URL: www.uclouvain.be

        Language: English - Date: 2011-12-14 05:30:43
          178Hashing / Cryptographic hash function / Trie / Merkle tree / RSA / B-tree

          VeriStream – A Framework for Verifiable Data Streaming Dominique Sch¨oder and Mark Simkin Saarland University Saarbr¨ ucken, Germany

          Add to Reading List

          Source URL: fc15.ifca.ai

          Language: English - Date: 2015-01-11 00:33:17
          179Cross-platform software / Scripting languages / Object-oriented programming languages / High-level programming languages / Procedural programming languages / Perl / Foreach loop / AWK / D / For loop / Hash function / C++ classes

          Perl Primer An Introduction to Perl for C++ Programmers by Frank McCown and Tim Baird Harding University PERL is the Practical Extraction and Report Language (or Pathologically Eclectic Rubbish Lister)

          Add to Reading List

          Source URL: www.harding.edu

          Language: English - Date: 2005-06-16 11:34:40
          180Bioinformatics / Genetics / Search algorithms / Biology / Public-domain software / Computational phylogenetics / DNA sequencing / SAMtools / Sequence alignment / Hash function / Hash table / Human genome

          Running SNAP The SNAP Team September, Introduction SNAP is a tool that is intended to serve as the read aligner in a gene sequencing pipeline. Its theory of

          Add to Reading List

          Source URL: snap.cs.berkeley.edu

          Language: English - Date: 2013-12-20 16:37:24
          UPDATE