Hash function

Results: 1800



#Item
301Method / Computer performance / Software optimization / Object-oriented programming / Memoization / Search algorithms / Common Lisp Object System / Generic function / Hash function / Computing / Computer programming / Software engineering

Efficient Method Dispatch in PCL Gregor J. Kiczales and Luis H. Rodriguez Jr. Published in proceedings of the 1990 ACM Conference on Lisp and Functional Programming, pages 99  105, Also appears in A. Paepcke, e

Add to Reading List

Source URL: www2.parc.com

Language: English - Date: 1999-09-13 18:19:02
302Search algorithms / Computing / Information retrieval / Artificial intelligence / Cryptography / Hash function / Online codes / Hash list / Hash tree / Cryptographic hash functions / Error detection and correction / Hashing

PDF Document

Add to Reading List

Source URL: coralcdn.org

Language: English - Date: 2004-03-19 09:39:34
303System software / Android / Search algorithms / Dalvik / Java virtual machine / Hexadecimal / Algorithm / Hash function / Java / Computing / Error detection and correction / Software

Android: From Reversing to Decompilation Anthony Desnos, Geoffroy Gueguen ESIEA: Operational Cryptology and Virology Laboratory , Abstract This talk deals with Android’s bytecode analysi

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-04-07 14:20:34
304Arrays / Data management / Bloom filter / Search algorithms / Bit array / Lookup table / Hash function / Filter / SQL / Computing / Computer programming / Hashing

Invertible Bloom Lookup Tables Joe Simons presenting paper by Goodrich and Mitzenmacher Bloom Filter

Add to Reading List

Source URL: www.ics.uci.edu

Language: English - Date: 2012-10-01 19:32:21
305Combinatorics / Cryptography / Search algorithms / Applied mathematics / SHA-2 / Theoretical computer science / Permutation / Hash function / Independence / Mathematics / Cryptographic hash functions / Hashing

i A random zoo: sloth, un∨corn, and trx Arjen K. Lenstra and Benjamin Wesolowski EPFL IC LACAL, Station 14, CH-1015 Lausanne, Switzerland Abstract. Many applications require trustworthy generation of public random num

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-22 06:51:37
306NSD / Search algorithms / Unbound / Tcpdump / Name server / Hash function / Software / System software / Domain name system

NSEC3 Hash Performance Yuri Schaeffer Matthijs Mekking http://www.nlnetlabs.nl/

Add to Reading List

Source URL: nlnetlabs.nl

Language: English - Date: 2010-03-30 09:29:56
307MD5 / Search algorithms / Collision attack / MD4 / Hash function / Merkle–Damgård construction / Preimage attack / Crypt / SHA-1 / Cryptography / Cryptographic hash functions / Hashing

An algorithm for MD5 single-block collision attack using high-performance computing cluster

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-11-07 01:57:01
308Data management / Search algorithms / Information / Security / Cryptography / Digital watermarking / Database / Relational database / Hash function / Watermarking / Database theory / Database management systems

Database Forensics in the Service of Information Accountability Kyriacos E. Pavlou Department of Computer Science The University of Arizona P.O. Box

Add to Reading List

Source URL: www.cs.arizona.edu

Language: English - Date: 2011-11-15 03:32:08
309Cryptography / Search algorithms / Database theory / Tamper-evident / Database security / Forensic science / Mass spectrometry software / Cryptographic hash function / Hash function / Science / Packaging / Security

D RAGOON: An Information Accountability System for High-Performance Databases Kyriacos E. Pavlou 1 and Richard T. Snodgrass 2 Department of Computer Science, The University of Arizona P.O. Box, Tucson, AZ 85721–

Add to Reading List

Source URL: www.cs.arizona.edu

Language: English - Date: 2012-03-18 19:10:26
310Artificial intelligence / Cryptography / Hash table / Information science / Hash function / Hash chain / Cryptographic hash functions / Search algorithms / Hashing / Information retrieval

Forensic Analysis of Database Tampering Kyriacos Pavlou Richard T. Snodgrass Department of Computer Science

Add to Reading List

Source URL: www.cs.arizona.edu

Language: English - Date: 2007-09-24 16:43:05
UPDATE