Hash function

Results: 1800



#Item
421Hamar / MD6 / NIST hash function competition / Haugen

Mid  Distance  8-­‐12  Dog  Class WR CR $Musher  Name Martin  Dickel Martin  Dickel  Total Remy  Coste Remy  Coste  Total

Add to Reading List

Source URL: www.sleddogsport.net

Language: English - Date: 2015-04-20 00:24:37
422Hash function / Cryptographic hash functions / Information retrieval / Artificial intelligence / Cyberwarfare / Cryptography / Hashing / Error detection and correction

COMPUTER SCIENCE TRIPOS Part IB – 2012 – Paper 4 9 Security I (MGK) (a) Name and briefly explain three increasingly demanding security properties expected from a secure hash function h.

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2014-06-09 10:18:42
423Information science / Artificial intelligence / Cuckoo hashing / Hash table / Hash function / Perfect hash function / Dynamic perfect hashing / Tabulation hashing / Universal hashing / Hashing / Search algorithms / Information retrieval

Advanced Algorithms – COMS31900Lecture 4 Cuckoo hashing Markus Jalsenius

Add to Reading List

Source URL: www.cs.bris.ac.uk

Language: English - Date: 2014-03-11 09:18:18
424Information science / Artificial intelligence / Hash table / Hash function / Cryptographic hash function / Linear probing / Java hashCode() / Quadratic probing / Hashing / Search algorithms / Information retrieval

3.4 HASH TABLES Algorithms F O U R T H R O B E R T

Add to Reading List

Source URL: t2.hhg.to

Language: English - Date: 2012-04-03 10:31:39
425Information science / Artificial intelligence / Hash table / Universal hashing / Hash function / Perfect hash function / Cryptographic hash function / Associative array / Tabulation hashing / Hashing / Search algorithms / Information retrieval

Advanced Algorithms – COMS31900Lecture 3 Static Perfect Hashing

Add to Reading List

Source URL: www.cs.bris.ac.uk

Language: English - Date: 2014-03-11 09:18:18
426Internet protocols / Internet standards / Secure communication / FIPS 140-2 / HMAC / Advanced Encryption Standard / NetBackup / Cryptographic hash function / Cryptographic Module Validation Program / Cryptography / Cryptography standards / Hashing

Microsoft Word - 1a - SYMC NBU FIPS 140 Security Policy v1-0.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-01-14 11:56:40
427Symmetric-key algorithm / Cryptographic hash function / Authenticated encryption / Cipher / Public-key cryptography / Random oracle / Cryptography / Encryption / Advanced Encryption Standard

ACISP 2015 Accepted papers Australasian Conference on Information Security and Privacy Queensland University of Technology, Gardens Point, Brisbane www.acisp2015.qut.edu.au Paper

Add to Reading List

Source URL: www.acisp2015.qut.edu.au

Language: English - Date: 2015-04-12 20:54:57
428Search algorithms / Image search / Error detection and correction / Hash function / RANSAC / Image retrieval / Search engine indexing / MinHash / Information science / Statistics / Information retrieval

Image Retrieval with Geometry-Preserving Visual Phrases Yimeng Zhang Zhaoyin Jia Tsuhan Chen School of Electrical and Computer Engineering, Cornell University {yz457,zj32,tsuhan}@cornell.edu

Add to Reading List

Source URL: chenlab.ece.cornell.edu

Language: English - Date: 2012-05-03 12:59:34
429Hash function / Information retrieval / Artificial intelligence / Information science / Cryptography / Cryptographic hash function / Message authentication codes / Hashing / HMAC

############################################################## Keyed-Hash Message Authentication Code (HMAC) Hashlen = 224 ############################################################## Key length = 64

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-08-08 12:49:28
430Computer programming / Information retrieval / Hash table / Hash function / Cryptographic hash function / Lookup table / Van Emde Boas tree / Associative array / Universal hashing / Hashing / Search algorithms / Computing

Advanced Algorithms – COMS31900Lecture 2 Hash tables Markus Jalsenius

Add to Reading List

Source URL: www.cs.bris.ac.uk

Language: English - Date: 2014-03-11 09:18:18
UPDATE