Hash function

Results: 1800



#Item
321Information / Database / Hash function / Transaction processing system / Hash table / Cryptographic hash function / Richard T. Snodgrass / Microsoft SQL Server / Partition / Database management systems / Data management / Data

Forensic Analysis of Database Tampering Kyriacos E. Pavlou and Richard T. Snodgrass University of Arizona

Add to Reading List

Source URL: www.cs.arizona.edu

Language: English - Date: 2008-09-02 20:32:26
322Quantum information science / Cryptographic hash functions / Post-quantum cryptography / McEliece cryptosystem / Quantum key distribution / NIST hash function competition / Quantum computer / Advanced Encryption Standard / Symmetric-key algorithm / Cryptography / Quantum cryptography / Public-key cryptography

Living with post quantum cryptography

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-02 14:17:26
323Computing / Cryptographic hash functions / Information retrieval / Information science / Hash function / Database / Hash list / Email / Error detection and correction / Hashing / Search algorithms

ABOUT goTrace is developed by United Nations Office on Drugs and Crime (UNODC). The United Kingdom provided the goTrace Project with seed funding inThis has allowed a prototype to be developed and offered for tri

Add to Reading List

Source URL: www.imolin.org

Language: English - Date: 2015-03-20 06:35:24
324Information retrieval / Computational linguistics / Error detection and correction / Hash function / Locality-sensitive hashing / Search engine indexing / N-gram / Information science / Science / Search algorithms

Scaling Historical Text Re-use Marco B¨uchler G¨ottingen Centre for Digital Humanities Georg-August-University G¨ottingen G¨ottingen, Germany Email:

Add to Reading List

Source URL: bighumanities.files.wordpress.com

Language: English - Date: 2014-10-26 22:39:10
325Finite-state machine / Digital electronics / Cryptographic hash function / Forensic science / Hash function / Digital signature / Cryptography / Electronic engineering / Automata theory

Journal of Digital Forensics, Security and Law, VolColumn: The Physics of Digital Information-Part 21 Fred Cohen

Add to Reading List

Source URL: all.net

Language: English - Date: 2012-09-01 08:58:29
326Artificial intelligence / Hash function / Hash table / Cryptographic hash function / Tabulation hashing / SUHA / Search algorithms / Hashing / Information science

Sketch-Based Linear Value Function Approximation Marc G. Bellemare University of Alberta Joel Veness

Add to Reading List

Source URL: jveness.info

Language: English - Date: 2012-11-09 12:10:55
327Information retrieval / Artificial intelligence / Hash table / Consistent hashing / Hash function / Extendible hashing / Cuckoo hashing / Hashing / Search algorithms / Information science

A Fast, Minimal Memory, Consistent Hash Algorithm    John Lamping, Eric Veach  Google    Abstract 

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2014-06-09 20:16:29
328Evaluation / Science / Cryptographic Module Validation Program / Cryptographic Module Testing Laboratory / Validation / Cryptography / Verification and validation / Cryptographic hash function / FIPS 140-3 / Cryptography standards / Computer security / FIPS 140-2

<4D6963726F736F667420576F7264202D204A434D2D30312088C38D86838283578385815B838B8E8E8CB18B7982D194468FD890A7937882CC8AEE967B8B4B92F62E646F63>

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-05-28 08:16:10
329Information retrieval / Information science / Universal hashing / Hash function / Hash table / Cryptographic hash function / Perfect hash function / Tabulation hashing / SUHA / Hashing / Search algorithms / Artificial intelligence

Algorithms Lecture 12: Hash Tables [Fa’13] Insanity is repeating the same mistakes and expecting different results. — Narcotics Anonymous (1981)

Add to Reading List

Source URL: web.engr.illinois.edu

Language: English - Date: 2014-12-28 09:02:37
330NESSIE / SOBER / Nimbus / LEVIATHAN / Hierocrypt / Grand Cru / SAFER / Cryptographic hash function / NOEKEON / Cryptography / Block ciphers / Stream ciphers

Project Number ISTProject Title

Add to Reading List

Source URL: www.di.ens.fr

Language: English - Date: 2002-10-21 08:30:46
UPDATE