Hash function

Results: 1800



#Item
221Cryptography / Applied mathematics / Block cipher / Stream cipher / Cryptographic hash function / Cryptanalysis / Data Encryption Standard / Joan Daemen / VEST / Cipher / Symmetric-key algorithm / Selected Areas in Cryptography

PDF Document

Add to Reading List

Source URL: jda.noekeon.org

Language: English - Date: 2013-08-28 07:53:23
222Public-key cryptography / Elliptic Curve DSA / Hash function / Key / Wallet / Cryptographic nonce / SHA-2 / Cryptography / Bitcoin / Peer-to-peer computing

Deterministic wallets End Deterministic wallets Gregory Maxwell et. al.

Add to Reading List

Source URL: www.cs.technion.ac.il

Language: English - Date: 2014-05-26 22:22:44
223Search algorithms / Molecular biology / DNA sequencing / Velvet assembler / Sequence assembly / Parallel computing / Hash table / Hash function / Shotgun sequencing / Biology / Bioinformatics / Genetics

Parallelization of Velvet,“a de novo genome sequence assembler” Nitin Joshi§†∗ , Shashank Shekhar Srivastava§†∗ , M. Milner Kumar† , Jojumon Kavalan† , Shrirang K. Karandikar† and Arundhati Saraph†

Add to Reading List

Source URL: www.hipc.org

Language: English - Date: 2011-11-11 12:59:10
224Information science / Information retrieval / Hash function / Hash table / Cryptographic hash function / Lookup table / Database / Search algorithms / Hashing / Computing

Large Scale Machine Learning

Add to Reading List

Source URL: www.sanjivk.com

Language: English - Date: 2010-10-12 11:05:04
225Cryptographic hash function / Hash function / SHA-1 / Tiny Encryption Algorithm / Free60 / Homebrew / Cryptography / Xbox / Search algorithms

Chapter 11 - Developing Software for the Xbox cheaper than a Powerball ticket. Another approach, related to cracking the RSA-2048 bit key, is to modify an existing, signed Xbox executable in a useful manner without chan

Add to Reading List

Source URL: www.xenatera.com

Language: English - Date: 2003-04-17 04:53:36
226Key management / PAdES / XAdES / CAdES / Digital signature / European Telecommunications Standards Institute / Electronic signature / Cryptographic hash function / Public key certificate / Cryptography / Cryptography standards / Public-key cryptography

TRV1Electronic Signatures and Infrastructures (ESI); Business guidance on cryptographic suites

Add to Reading List

Source URL: www.etsi.org

Language: English - Date: 2015-05-12 09:17:43
227Common Criteria / Evaluation / Keystore / Protection Profile / Security Target / Cryptographic hash function / Cryptography / Computer security / Public-key cryptography

Swedish Certification Body for IT Security Certification Report - Filkrypto 1.0 Issue: 1.0, 2007-Oct-05 Responsible: Anders Staaf

Add to Reading List

Source URL: www.tutus.se

Language: English - Date: 2015-07-12 19:16:51
228Software engineering / Distributed hash table / Kademlia / Peer-to-peer / Hash table / Prefix hash tree / Trie / Hash list / Hash function / Distributed data storage / Computing / Computer programming

Microsoft Word - SIGIR06-soro-lai-final.doc

Add to Reading List

Source URL: www.geo.unizh.ch

Language: English - Date: 2006-07-06 07:27:00
229Information retrieval / Locality-sensitive hashing / Hash function / Hash table / Piotr Indyk / Search algorithms / Artificial intelligence / Information science

Beyond Locality-Sensitive Hashing Alexandr Andoni (Microsoft Research), Piotr Indyk (MIT), Huy L. Nguyen (Princeton) and Ilya Razenshteyn (MIT) (Approximate) Near Neighbor Problem ((A)NN) The main approach: data-depende

Add to Reading List

Source URL: www.ilyaraz.org

Language: English - Date: 2014-04-21 21:52:06
230Information science / Artificial intelligence / Hash table / Hash function / Cryptographic hash function / Linear hashing / Search algorithms / Hashing / Information retrieval

Supplementary Material for “Compact Hyperplane Hashing with Bilinear Functions” Wei Liu† Jun Wang‡

Add to Reading List

Source URL: www.sanjivk.com

Language: English - Date: 2012-06-12 10:11:42
UPDATE