Hash function

Results: 1800



#Item
291Crime prevention / National security / Computer network security / Electronic commerce / Password / Phishing / Public-key cryptography / Kerberos / Cryptographic hash function / Cryptography / Security / Computer security

Contents Preface to the Second Edition xxv

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2011-12-05 05:58:34
292Information science / Artificial intelligence / Error detection and correction / Hash function / Hash table / Trie / Search algorithms / Hashing / Information retrieval

A Probabilisti Dynami Te hnique for the Distributed Generation of Very Large State Spa es W.J. Knottenbelt a;1

Add to Reading List

Source URL: pubs.doc.ic.ac.uk

Language: English - Date: 2011-11-14 07:13:41
293Procedural programming languages / Search algorithms / C / Cross-platform software / Hash function / Hash table / ALGOL 68 / Binary tree / Pointer / Computing / Software engineering / Computer programming

Index-1 Index absorption law …………………………………………. abs …………………………………………………….. abstract ………………………………………………...

Add to Reading List

Source URL: www.bluepelicanjava.com

Language: English - Date: 2013-07-12 16:05:39
294Digital signature / Symmetric-key algorithm / Block cipher / Cryptographic hash function / Feistel cipher / PKCS / One-way function / Cipher / Cryptanalysis / Cryptography / Public-key cryptography / Key management

Table of Contents List of Tables List of Figures Foreword by R.L. Rivest Preface

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2013-03-20 04:32:08
295Advanced Encryption Standard / AES instruction set / X86 architecture / FIPS 140-2 / Cryptographic hash function / FIPS 140 / Key Wrap / Crypto++ / Pretty Good Privacy / Cryptography / Cryptography standards / Cryptographic software

Symantec PGP Cryptographic Engine FIPSSecurity Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-05-21 10:19:50
296Cryptographic protocols / Cryptographic software / Hashing / Secure communication / IPsec / HMAC / Secure Shell / Key generation / Cryptographic hash function / Cryptography / Computing / Internet protocols

IC2M Security Policy_rel5

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-05-28 11:20:09
297Key management / Diffie–Hellman key exchange / Ciphertext / Cryptographic hash function / Vigenère cipher / RSA / Key / Cryptanalysis / Whitfield Diffie / Cryptography / Cryptographic protocols / Public-key cryptography

174 BLOWN TO BITS Lessons for the Internet Age Let’s pause for a moment to consider some of the lessons of cryptographic

Add to Reading List

Source URL: inst.eecs.berkeley.edu

Language: English - Date: 2012-03-17 16:37:42
298SHA-2 / SHA-1 / HMAC / Crypto++ / Crypt / NIST hash function competition / Tiger / HAS-160 / Cryptographic hash functions / Error detection and correction / Cryptography

Comparative Analysis of the Hardware Implementations of Hash Functions SHA-1 and SHA-512 Tim Grembowski1, Roar Lien1, Kris Gaj1, Nghi Nguyen1, Peter Bellows2, Jaroslav Flidr2, Tom Lehman2, Brian Schott2 1Electrical

Add to Reading List

Source URL: web.archive.org

Language: English
299BitTorrent / Peer-to-peer / Computing / Cryptographic hash functions / Distribution / Hash function / Hash list / Mathematics / EigenTrust / File sharing networks / Error detection and correction / Mathematical analysis

Stochastic Analysis of A Randomized Detection Algorithm for Pollution Attack in P2P Live Streaming Systems Yongkun Li John C.S. Lui The Chinese University of Hong Kong

Add to Reading List

Source URL: www.cs.cuhk.hk

Language: English - Date: 2011-07-14 21:00:42
300Secure communication / Transport Layer Security / Symmetric-key algorithm / RC4 / Block cipher modes of operation / Stream cipher / Ciphertext / Padding / Cryptographic hash function / Cryptography / Cryptographic protocols / Internet protocols

1 SSL, TLS, and Cryptography We live in an increasingly connected world. During the last decade of the 20th century the Internet rose to popularity and forever changed how we live our lives. Today we rely on our phones a

Add to Reading List

Source URL: sslmate.com

Language: English - Date: 2015-06-06 19:18:36
UPDATE