Hash function

Results: 1800



#Item
181Hashing / Search algorithms / Hash function / Cryptographic hash function / Join / Dynamic programming / Record linkage / Hash table / Dynamic perfect hashing

Optimal Hashing Schemes for Entity Matching Nilesh Dalvi Vibhor Rastogi Anirban Dasgupta

Add to Reading List

Source URL: www2013.wwwconference.org

Language: English - Date: 2014-07-21 08:47:06
182Key management / Cryptography standards / Cryptography / FIPS 201 / Standards / Key size / Cryptographic hash function / Key / Cryptographic Module Validation Program / Digital Signature Algorithm / Public-key cryptography / Smart card

NIST Special Publication

Add to Reading List

Source URL: nvlpubs.nist.gov

Language: English - Date: 2015-06-10 13:59:58
183Cryptography / Cryptographic hash functions / Error detection and correction / SHA-1 / SHA-2 / MD5 / NIST hash function competition / SHA-3 / Elliptic curve only hash / Elliptic Curve Digital Signature Algorithm / Libgcrypt / FORK-256

Elliptic Curve Hash (and Sign) ECOH (and the 1-up problem for ECDSA) Daniel R. L. Brown Certicom Research ECC 2008, Utrecht, Sep

Add to Reading List

Source URL: www.hyperelliptic.org

Language: English - Date: 2008-09-27 14:59:29
184

(Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others (Extended Version) Shuang Wu1 , Dengguo Feng1 , Wenling Wu1 , Jian Guo2 , Le Dong1 , and Jian Zou1 1 State Key Laboratory of Information Securit

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-09-10 00:05:29
    185Computational neuroscience / Neuroscience / Nervous system / Sensory systems / Artificial neural networks / Applied mathematics / Receptive field / Cerebellar model articulation controller / One-key MAC / Hash function / Contrast / Image segmentation

    UNH_CMAC Version 2.1 The University of New Hampshire Implementation of the Cerebellar Model Arithmetic Computer - CMAC August 31, 1994 (last modified July, 1996) W. Thomas Miller and Filson H. Glanz

    Add to Reading List

    Source URL: incompleteideas.net

    Language: English - Date: 2013-04-20 17:24:26
    186

    Hardware Implementations of a Variant of the Z´ emor-Tillich Hash Function: Can a Provably Secure Hash Function be very efficient ? Giacomo de Meulenaer Christophe Petit and Jean-Jacques Quisquater

    Add to Reading List

    Source URL: www.uclouvain.be

    Language: English - Date: 2011-12-14 05:30:37
      187

      Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512 ¨ Leurent2 , Florian Mendel3 , Mar´ıa Praveen Gauravaram1 , Gaeten 4

      Add to Reading List

      Source URL: 2010.africacrypt.com

      Language: English - Date: 2010-05-06 01:47:12
        188Information retrieval / Hashing / Error detection and correction / Information science / Computer programming / Cryptographic hash functions / Search algorithms / Distributed data storage / Bloom filter / Hash function / Hash list / Trie

        Data Discovery and Dissemination with DIP tinyos-2.x/tos/lib/net/dip Kaisen Lin UC San Diego

        Add to Reading List

        Source URL: sing.stanford.edu

        Language: English - Date: 2014-11-10 18:30:10
        189Cryptography / Public-key cryptography / Commitment scheme / Secret sharing / Zero-knowledge proof / Cryptographic hash function / Coin flipping / Universal composability / Cryptographic primitive / One-way function / Claw-free permutation / RSA

        Very-efficient simulatable flipping of many coins into a well (and a new very-efficient extractable-and-equivocable commitment scheme) Luís T. A. N. Brandão∗ (Technical report – June 28, Abstract. Secure two

        Add to Reading List

        Source URL: eprint.iacr.org

        Language: English - Date: 2015-06-28 21:51:08
        190Cryptography / Hashing / Error detection and correction / Cryptographic hash functions / Search algorithms / Commitment scheme / Hash function / Coin flipping / RSA / Crypt

        Very-efficient flipping of many coins (between two parties) Luís T. A. N. Brandão University of Lisbon and Carnegie Mellon University

        Add to Reading List

        Source URL: www.iacr.org

        Language: English - Date: 2014-03-01 16:01:06
        UPDATE