Hash function

Results: 1800



#Item
271RSA / Random oracle / Optimal asymmetric encryption padding / Digital signature / Strong RSA assumption / Cryptographic hash function / Index of cryptography articles / Lamport signature / Cryptography / Public-key cryptography / Full Domain Hash

On the Instantiability of Hash-and-Sign RSA Signatures Yevgeniy Dodis1 , Iftach Haitner2⋆ , and Aris Tentes1 1 2

Add to Reading List

Source URL: www.cs.tau.ac.il

Language: English - Date: 2013-06-11 04:12:51
272Checksum / NTFS / Information science / Computing / Hashing / Information retrieval / Cryptography / Search algorithms / Error detection and correction / Hash function

Jim  Lyle   National  Institute  of  Standards  and  Technology   Disclaimer    Certain  trade  names  and  company  products  are   mentioned  in  the  text

Add to Reading List

Source URL: www.cftt.nist.gov

Language: English - Date: 2010-09-16 15:17:26
273RSA / Optimal asymmetric encryption padding / Denotational semantics / ElGamal encryption / Cryptographic hash function / Random oracle / XTR / Function / Digital signature / Cryptography / Public-key cryptography / Ciphertext indistinguishability

Formal certification of ElGamal encryption A gentle introduction to CertiCrypt ⋆ Gilles Barthe1 , Benjamin Gr´egoire2,3, Sylvain Heraud3 , and

Add to Reading List

Source URL: software.imdea.org

Language: English - Date: 2013-03-13 12:33:24
274Finite fields / Information theory / Information / Computing / Mathematics / Network coding / Cryptographic hash function / Hash function / One-way function / Hashing / Cryptography / Coding theory

On the Practical and Security Issues of Batch Content Distribution Via Network Coding Qiming Li Dah-Ming Chiu John C.S. Lui Computer & Information Science Dept

Add to Reading List

Source URL: www.cs.cuhk.hk

Language: English - Date: 2006-08-26 01:38:18
275Block cipher / Symmetric-key algorithm / Playfair cipher / Ciphertext / Cipher / One-time pad / Keystream / Cryptanalysis / Cryptographic hash function / Cryptography / Stream ciphers / Substitution cipher

Security Engineering: A Guide to Building Dependable Distributed Systems C H A P TE R 5 Cryptography

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2007-02-27 09:35:26
276Computer architecture / GPGPU / Stream processing / Stream / Supercomputer / Hash function / Computing / Concurrent computing / Computer programming

Automated Reliability Classification of Queueing Models for Streaming Computation Jonathan Beard, Cooper Epstein, and Roger Chamberlain

Add to Reading List

Source URL: icpe2015.ipd.kit.edu

Language: English - Date: 2015-02-07 13:27:16
277Electronic commerce / Cryptographic protocols / Secure messaging / Certificate authority / Transport Layer Security / Public key certificate / Cryptographic hash function / Public key fingerprint / Man-in-the-middle attack / Cryptography / Public-key cryptography / Key management

Bringing Deployable Key Transparency to End Users Marcela S. Melara, Aaron Blankstein, Joseph Bonneau, Edward W. Felten, Michael J. Freedman Princeton University Abstract Despite its critical importance, secure key veri

Add to Reading List

Source URL: www.jbonneau.com

Language: English - Date: 2015-04-10 15:07:29
278Search algorithms / Software optimization / Computer performance / Object-oriented programming / Hash table / Lookup table / Hash function / Database index / Smalltalk / Computing / Computer programming / Software engineering

viewed/modified inside worlds), and WWorld, which represents worlds. The methods of WObject and its subclasses are automatically instrumented in order to indirect all instance variable accesses (reads and writes) through

Add to Reading List

Source URL: tinlizzie.org

Language: English - Date: 2011-07-23 05:16:33
279Pharmacology / Hash oil / Cannabis / Hash function / California Department of Toxic Substances Control / Legality of cannabis / Clandestine chemistry / Butane / Methamphetamine / Euphoriants / Neurochemistry / Medicine

D E PA R T M E N T o f T O X I C

Add to Reading List

Source URL: www.dtsc.ca.gov

Language: English - Date: 2015-01-06 13:15:00
280Alice and Bob / Replay attack / Man-in-the-middle attack / Cryptographic hash function / RSA / Communications protocol / Digital signature / Cryptography / Public-key cryptography / Cryptographic protocols

On Message Recognition Protocols: Recoverability and Explicit Confirmation Ian Goldberg David R. Cheriton School of Computer Science, University of Waterloo Waterloo, Ontario Canada N2L 3G1

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2009-11-13 20:20:01
UPDATE