Hash function

Results: 1800



#Item
341Hashing / Message authentication codes / Search algorithms / Cryptographic hash function / Public-key cryptography / Random number generation / PUF / Hash function / One-way function / Cryptography / Randomness / Physical Unclonable Function

Controlled Physical Random Functions and Applications BLAISE GASSEND, MARTEN VAN DIJK, DWAINE CLARKE and EMINA TORLAK Massachusetts Institute of Technology PIM TUYLS Philips Research

Add to Reading List

Source URL: homes.cs.washington.edu

Language: English - Date: 2014-08-13 19:26:58
342Cube attack / Cipher / Public-key cryptography / Encryption / International Data Encryption Algorithm / Authenticated encryption / Cryptographic hash function / Cryptography / Homomorphic encryption / Cryptanalysis

PROGRAM EUROCRYPT 2015 MONDAY, April 27th 9:00 9:15 Welcome

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English - Date: 2015-04-16 13:21:14
343Information retrieval / Artificial intelligence / Hash table / Hash function / Garbage collection / Cryptographic hash function / Double hashing / Hash / Associative array / Hashing / Search algorithms / Information science

Generation-Friendly Eq Hash Tables Abdulaziz Ghuloum and R. Kent Dybvig Department of Computer Science, Indiana University, Bloomington, IN 47408 {aghuloum,dyb}@cs.indiana.edu Abstract

Add to Reading List

Source URL: repository.readscheme.org

Language: English - Date: 2012-08-10 19:21:06
344Search algorithms / Mathematics / Prototype JavaScript Framework / Serialization / Enumeration / Hash function / Array data type / Trie / Computing / Ajax / Software

Prototype JavaScript LibraryUtility Methods String Enumerable

Add to Reading List

Source URL: snook.ca

Language: English - Date: 2012-07-17 12:50:26
345Computer hardware / Computer storage media / Computing / Hashing / Cryptography / Hash table / Hash function / SHA-2 / SHA-1 / Search algorithms / Cryptographic hash functions / Information science

doi:j.diin

Add to Reading List

Source URL: www.dfrws.org

Language: English - Date: 2015-03-03 22:33:04
346Hash function / Hash table / Information science / Artificial intelligence / Information retrieval / Stack / Logarithm / Search algorithms / Error detection and correction / Hashing

1 The Tiled Bitmap Forensic Analysis Algorithm Kyriacos E. Pavlou and Richard T. Snodgrass, Senior Member, IEEE Abstract— Tampering of a database can be detected

Add to Reading List

Source URL: www.cs.arizona.edu

Language: English - Date: 2009-04-24 16:55:29
347Search algorithms / Error detection and correction / Hash function / Information retrieval / Artificial intelligence / SHA-1 / Bloom filter / Sybil attack / Hashing / Cryptography / Cryptographic hash functions

582 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 29, NO. 3, MARCH 2011 P2DAP – Sybil Attacks Detection in Vehicular Ad Hoc Networks

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2012-03-12 23:31:44
348Bitcoin / Peer-to-peer computing / Graphics hardware / Salsa20 / Graphics processing unit / Crypt / Application-specific integrated circuit / Hash function / ASICS / Software / Computing / Electronic engineering

NeoScrypt - the latest proof of work algorithm As of the 26th of July 2014, NeoScrypt will be the latest proof of work (PoW) algorithm to hit the cryptocurrency world. It has been designed as an "ASIC-resistant" algorit

Add to Reading List

Source URL: www.feathercoin.com

Language: English - Date: 2014-07-26 13:27:07
349Mathematical analysis / Search algorithms / Hash function / Philippe Flajolet / Lagrange inversion theorem / Generating function / Stirling numbers and exponential generating functions / Mathematics / Combinatorics / Analytic combinatorics

From the Discrete to the Continuous, and Back... Philippe Flajolet INRIA, France

Add to Reading List

Source URL: algo.inria.fr

Language: English - Date: 2008-06-26 00:35:50
350Hash function / Cyberwarfare / Quantum superposition / Security / Applied mathematics / Cryptography / Commitment scheme / Cryptographic hash function

Computationally binding quantum commitments Dominique Unruh University of Tartu April 21, 2015

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-21 10:58:50
UPDATE