Hash function

Results: 1800



#Item
401Message authentication codes / Digital signature / Cryptographic hash function / Cryptographic primitive / RSA / Key / Probabilistic encryption / Block cipher / Galois/Counter Mode / Cryptography / Public-key cryptography / Key management

Abstract appearing in Proceedings of the 27th ACM Symposium on the Theory of Computing, MayIncremental Cryptography and Application to Virus Protection Mihir Bellare∗

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2004-08-02 17:51:17
402Probability theory / Advantage / Oracle machine / Standard model / Oracle Corporation / Pseudorandom function family / Random function / Computational complexity theory / Pseudorandomness / Cryptography / Cryptographic hash functions / Random oracle

The Random Oracle Methodology, Revisited∗ Ran Canetti† Oded Goldreich‡ Shai Halevi§

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-08-01 15:32:21
403Structured storage / Perl / Dbm / Berkeley DB / Perl module / Ndbm / Hash function / Filter / Electronic filter / Computing / Software engineering / Software

Perl versiondocumentation - DBM_Filter NAME DBM_Filter -- Filter DBM keys/values SYNOPSIS

Add to Reading List

Source URL: perldoc.perl.org

Language: English - Date: 2014-10-03 16:13:32
404Cryptographic hash function / Advanced Encryption Standard / Disk encryption theory / IEEE P1619 / Cryptography / Block cipher / Cipher

1 Reconfigurable Hardware Implementations of Tweakable Enciphering Schemes Cuauhtemoc Mancillas-L´opez, Debrup Chakraborty and Francisco Rodr´ıguez-Henr´ıquez

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-11-23 20:00:54
405MD5 / Cryptographic hash function / Computer data storage / Internet / Electronics / Email / Computing / Backup

Page 30 Southwestern Archivist Taming the Wild LISTSERV; or, How to Preserve Specialized E-Mail Lists By Lisa M. Schmidt • MATRIX: The Center for Humane Arts, Letters, and Social Sciences Online, Michigan State Univer

Add to Reading List

Source URL: www2.matrix.msu.edu

Language: English - Date: 2013-05-21 19:36:52
406Applied mathematics / Hashing / Suffix tree / Hash function / Hash table / Vertex cover / Bloom filter / Universal hashing / Time complexity / Theoretical computer science / Search algorithms / Computational complexity theory

Guide to Examinable Material COMS31900 – Advanced AlgorithmsDecember 2013 Overview This guide is organised topic by topic in the same order that the course was taught. References into the lectures are giv

Add to Reading List

Source URL: www.cs.bris.ac.uk

Language: English - Date: 2014-03-11 09:18:17
407Key size / Message authentication code / Block cipher / Cryptographic hash function / Cryptography / Symmetric-key algorithm / Cipher

Secure Communication Concepts Explained Simply A concise, self-teachable training course for people who want to understand the concepts of secure communications but don’t need to know the details .

Add to Reading List

Source URL: www.ciaranmchale.com

Language: English - Date: 2008-05-17 08:19:27
408USENIX / Hashing / Information technology management / Computing / Software / Search algorithms / Error detection and correction / Hash function

Efficient  MRC  Construc0on   with  SHARDS   Carl  Waldspurger          Nohhyun  Park   Alexander  Garthwaite          Irfan  Ahmad   CloudPhysics,  Inc.

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2015-02-18 17:36:12
409Information retrieval / Information science / Universal hashing / Hash function / Hash table / Cryptographic hash function / Tabulation hashing / SUHA / Search algorithms / Hashing / Artificial intelligence

Dictionaries Advanced Algorithms – COMS31900  In a dictionary data structure we store (key, value)-pairs such that for any key there is at most one pair (key, value) in the dictionary.  Often we want to perform the f

Add to Reading List

Source URL: www.cs.bris.ac.uk

Language: English - Date: 2014-03-11 09:18:18
410Information science / Artificial intelligence / Hash table / Cuckoo hashing / Universal hashing / Hash function / Dynamic perfect hashing / Double hashing / Perfect hash function / Search algorithms / Hashing / Information retrieval

Previously on COMS31900. . . Advanced Algorithms – COMS31900 Hashing with chaining Instead of a linked list, throw colliding

Add to Reading List

Source URL: www.cs.bris.ac.uk

Language: English - Date: 2014-03-11 09:18:18
UPDATE