Hash function

Results: 1800



#Item
251

Cryptographic Hash Function B LUE M IDNIGHT W ISH Norwegian University of Science and Technology Trondheim, Norway

Add to Reading List

Source URL: cryptography.hyperlink.cz

Language: English - Date: 2008-11-19 04:27:41
    252

    Randomized Algorithms 2015A – Problem Set 3 Robert Krauthgamer and Moni Naor Due: January 18, 2015 ∑ 1. Show that the hash function hr : {0, 1}n → {0, 1} mapping x 7→ ni=1 xi ri (mod 2), where ⃗r ∈ {0, 1}n is

    Add to Reading List

    Source URL: www.wisdom.weizmann.ac.il

    Language: English - Date: 2014-12-31 19:10:51
      253

      A framework for Measuring and Evaluating the Progress of the Cryptanalysis of the Hash Function Blue Midnight Wish The Blue Midnight Wish team October 6, 2010

      Add to Reading List

      Source URL: people.item.ntnu.no

      Language: English - Date: 2010-10-06 04:58:30
        254Information science / Artificial intelligence / Hash table / Hash function / Cuckoo hashing / Cryptographic hash function / Double hashing / Linear probing / Java hashCode() / Hashing / Search algorithms / Information retrieval

        Foundations of computing: Algorithms and Data Structures Rasmus Pagh September 29,

        Add to Reading List

        Source URL: itu.dk

        Language: English - Date: 2011-09-29 12:23:33
        255Computer programming / MD5 / SHA-1 / SHA-2 / MD4 / ALGOL 68 / Struct / Hash function / Whirlpool / Cryptographic hash functions / Cryptography / Computing

        Christian Grothoff COMP 3704 Computer Security Christian Grothoff

        Add to Reading List

        Source URL: grothoff.org

        Language: English - Date: 2011-06-21 07:45:47
        256Post-quantum cryptography / Error detection and correction / Cryptographic hash function / Merkle signature scheme / Digital signature / Hash function / Cryptography / Public-key cryptography / Hashing

        draft-irtf-cfrg-xmss-hash-based-signatures-00 - XMSS: Extended Hash-Based Signatures

        Add to Reading List

        Source URL: tools.ietf.org

        Language: English - Date: 2015-04-08 10:22:54
        257Information science / Artificial intelligence / Hash table / Hash join / Hash function / Block nested loop / Trie / Search algorithms / Hashing / Information retrieval

        Hash-Merge Join: A Non-blocking Join Algorithm for Producing Fast and Early Join Results∗ Mohamed F. Mokbel Ming Lu

        Add to Reading List

        Source URL: www-users.cs.umn.edu

        Language: English - Date: 2009-09-29 10:22:41
        258Error detection and correction / Information retrieval / Artificial intelligence / Computational complexity theory / Universal hashing / Lipschitz continuity / Hash function / Combinatory logic / Tabulation hashing / Search algorithms / Hashing / Theoretical computer science

        Compressive sensing using locality-preserving matrices Elyot Grant∗ Piotr Indyk∗ December 4, 2012

        Add to Reading List

        Source URL: people.csail.mit.edu

        Language: English - Date: 2013-06-10 19:22:49
        259Cryptographic protocol / ASP.NET / Cryptographic hash function / Symmetric-key algorithm / Computer security / Key / Cryptography / Security / Cryptographic primitive

        SECURITY DRIVEN .NET .NET/ASP.NET 4.5 STAN DRAPKIN. OCTOBER 2013. SECURITY DRIVEN .NET

        Add to Reading List

        Source URL: securitydriven.net

        Language: English - Date: 2015-04-04 22:36:18
        260Search algorithms / Modular arithmetic / Exponentials / Exponentiation by squaring / Montgomery reduction / Hash function / 64-bit / Euclidean vector / Mathematics / Algebra / Computer arithmetic

        Optimizing M AKWA on GPU and CPU Thomas Pornin, <> May 18, 2015 Abstract We present here optimized implementations of the M AKWA password hashing

        Add to Reading List

        Source URL: www.bolet.org

        Language: English - Date: 2015-05-18 18:18:01
        UPDATE