Hash function

Results: 1800



#Item
11The Politics of Cryptography: Bitcoin and The Ordering Machines

The Politics of Cryptography: Bitcoin and The Ordering Machines

Add to Reading List

Source URL: iqdupont.com

Language: English - Date: 2015-12-03 10:50:31
12Memory Footprint Matters: Efficient Equi-Join Algorithms for Main Memory Data Processing

Memory Footprint Matters: Efficient Equi-Join Algorithms for Main Memory Data Processing

Add to Reading List

Source URL: web.cse.ohio-state.edu

Language: English - Date: 2015-08-14 19:41:23
13ECHOPRINT - AN OPEN MUSIC IDENTIFICATION SERVICE Daniel P.W. Ellis LabROSA Columbia University  Brian Whitman

ECHOPRINT - AN OPEN MUSIC IDENTIFICATION SERVICE Daniel P.W. Ellis LabROSA Columbia University Brian Whitman

Add to Reading List

Source URL: static.echonest.com

Language: English - Date: 2011-09-24 13:52:34
14NSEC3 Hash Performance Yuri Schaeffer Matthijs Mekking  http://www.nlnetlabs.nl/

NSEC3 Hash Performance Yuri Schaeffer Matthijs Mekking http://www.nlnetlabs.nl/

Add to Reading List

Source URL: nlnetlabs.nl

Language: English - Date: 2010-03-30 09:29:56
15Algorithms and Data Structures Winter TermExercises for UnitLet U = {0, 1, . . . , K − 1}, let p ≥ K be a prime number, and let 0 < t < K. For 0 ≤ a, b < p define

Algorithms and Data Structures Winter TermExercises for UnitLet U = {0, 1, . . . , K − 1}, let p ≥ K be a prime number, and let 0 < t < K. For 0 ≤ a, b < p define

Add to Reading List

Source URL: www-tcs.cs.uni-sb.de

Language: English - Date: 2016-03-06 16:06:05
16Indifferentiable Hashing to Elliptic and Hyperelliptic Curves Mehdi Tibouchi NTT Secure Platform Laboratories  ECC Workshop 2013, 2013–09–17

Indifferentiable Hashing to Elliptic and Hyperelliptic Curves Mehdi Tibouchi NTT Secure Platform Laboratories ECC Workshop 2013, 2013–09–17

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English - Date: 2013-10-09 09:45:18
17Introduction to Smalltalk - Chapter 9 - Sets, bags, and dictionaries  Ivan TomekChapter 9 - Sets, bags, and dictionaries Overview This chapter presents the remaining frequently used collections - sets, bags,

Introduction to Smalltalk - Chapter 9 - Sets, bags, and dictionaries  Ivan TomekChapter 9 - Sets, bags, and dictionaries Overview This chapter presents the remaining frequently used collections - sets, bags,

Add to Reading List

Source URL: sdmeta.gforge.inria.fr

Language: English - Date: 2014-10-09 10:38:17
18CSE 584A Class 24 Jeremy Buhler April 20, 2016 1

CSE 584A Class 24 Jeremy Buhler April 20, 2016 1

Add to Reading List

Source URL: classes.engineering.wustl.edu

Language: English - Date: 2016-04-22 15:32:46
19Aggregate Addresses in CryptoNote: Towards Efficient Privacy Bytecoin Team September 8, Introduction

Aggregate Addresses in CryptoNote: Towards Efficient Privacy Bytecoin Team September 8, Introduction

Add to Reading List

Source URL: bytecoin.org

Language: English - Date: 2015-09-08 14:06:44
20l l l Il l l l| | l| l l l l l?gl lug gl lul l l l l l l l l l l l l l United States PatentPatent Number:

l l l Il l l l| | l| l l l l l?gl lug gl lul l l l l l l l l l l l l l United States PatentPatent Number:

Add to Reading List

Source URL: www.chaum.com

Language: English - Date: 2015-05-26 20:08:31