Hash function

Results: 1800



#Item
331MD5 / Search algorithms / Collision attack / Hash function / Padding / SHA-1 / Merkle–Damgård construction / Cryptography / Cryptographic hash functions / Hashing

Single-block collision attack on MD5 Marc Stevens Cryptology Group, CWI P.O. Box 94079, NL-1090 GB Amsterdam, The Netherlands January 29, 2012

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-01-29 17:14:50
332Search algorithms / Data / Relational database management systems / Database theory / Database / Hash function / Hash table / SQL / Cryptographic hash function / Database management systems / Data management / Computing

Microsoft Word - Thesis.doc

Add to Reading List

Source URL: www.cs.arizona.edu

Language: English - Date: 2010-12-07 14:51:15
333T / Computing / Software engineering / Computer programming / Error detection and correction / Hash function / Set

JAVA - DATA STRUCTURES http://www.tutorialspoint.com/java/java_data_structures.htm Copyright © tutorials point.com The dat a st ruct ures provided by t he Java ut ilit y package are very powerful and perform a wide ran

Add to Reading List

Source URL: www.tutorialspoint.com

Language: English - Date: 2015-04-27 04:47:14
334Geometry / Locality-sensitive hashing / Hash function / Hash table / Hamming distance / Nearest neighbor search / Search algorithms / Information science / Information retrieval

The Power of Asymmetry in Binary Hashing Behnam Neyshabur Payman Yadollahpour Yury Makarychev Toyota Technological Institute at Chicago

Add to Reading List

Source URL: papers.nips.cc

Language: English - Date: 2014-11-26 14:29:25
335Computing / Cryptographic hash function / Information / Hash tree / Transmission Control Protocol / Data / Hash function / IP traceback / Error detection and correction / Hashing / Cryptography

Seluge: Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks∗ Sangwon Hyun, Peng Ning, An Liu North Carolina State University Abstract

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:10
336Multiset / Cardinal number / Birthday problem / Hash function / Mathematics / Probability / Cardinality

ASIAN’04, Chiang Mai 2004 Counting by Coin Tossings Philippe Flajolet, INRIA, France http://algo.inria.fr/flajolet

Add to Reading List

Source URL: algo.inria.fr

Language: English - Date: 2004-12-05 10:29:47
337Information science / Artificial intelligence / Hash function / Perfect hash function / Hash table / Cryptographic hash function / Trie / Universal hashing / Tabulation hashing / Search algorithms / Hashing / Information retrieval

COMPUTNVG PRACTICES Using only a few simple and commonplace instructions, this algorithm efficiently maps variable-length text strings on to small integers.

Add to Reading List

Source URL: epaperpress.com

Language: English - Date: 2011-12-28 10:41:56
338Mathematical logic / Hash table / Hash function / Alert correlation / Predicate / Trie / Logic programming / Database index / Extensible Storage Engine / Search algorithms / Logic / Computing

Adapting Query Optimization Techniques for Efficient Intrusion Alert Correlation∗ Peng Ning and Dingbang Xu Department of Computer Science, North Carolina State University Raleigh, NC

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:06
339Pharmacology / Hash oil / Cannabis / Hash function / California Department of Toxic Substances Control / Legality of cannabis / Clandestine chemistry / Butane / Methamphetamine / Euphoriants / Neurochemistry / Medicine

D E PA R T M E N T o f T O X I C

Add to Reading List

Source URL: www.dtsc.ca.gov

Language: English - Date: 2015-01-06 13:15:00
340Internet protocols / Cryptographic protocols / Internet standards / Authenticator / Cryptographic hash function / Security token / Hash chain / Transport Layer Security / Cryptographic nonce / Computing / Cryptography / Internet

iHTTP: Efficient Authentication of Non-Confidential HTTP Traffic? Jason Gionta1 , Peng Ning1 , and Xiaolan Zhang2 1 2

Add to Reading List

Source URL: gionta.org

Language: English - Date: 2014-07-20 15:18:58
UPDATE