Hash function

Results: 1800



#Item
431Michael Reiter / Computable function / Carnegie Mellon University / VEST / Ciphertext / RSA / Cryptographic hash function / Cryptography / Public-key cryptography / Stream ciphers

Microsoft PowerPoint - SecurityOverview

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2006-01-27 11:55:21
432Electronic commerce / Computer security / Code signing / Extended Validation Certificate / Public key certificate / Digital signature / Trusted third party / Cryptographic hash function / Entrust / Cryptography / Public-key cryptography / Key management

What is Code Signing? The ins and outs of how code signing works and why it’s necessary Entrust Inc. Reserved.

Add to Reading List

Source URL: www.entrust.com

Language: English - Date: 2013-10-18 10:58:12
433Search algorithms / Data / Relational database management systems / Database theory / Database / Hash function / Hash table / SQL / Cryptographic hash function / Database management systems / Data management / Computing

Microsoft Word - Thesis.doc

Add to Reading List

Source URL: www.cs.arizona.edu

Language: English - Date: 2010-09-26 13:29:12
434Comma-separated values / Spreadsheet / Hash function / Software / Microsoft Excel / Computing

ANNEXURE -II MISSING DETAILS OF MEMBERS (FORM 5/FORM 10) (TO BE SUBMITTED BY EMPLOYER) The missing details will be electronic Form 5/10 in plain text format and will consist of DETAILED lines (one line for each member).

Add to Reading List

Source URL: www.epfindia.com

Language: English - Date: 2013-04-15 08:40:54
435Computing / Cryptography / Computer programming / B-tree / Search algorithms / Hash function / Bloom filter / MD5 / Binary tree / Hashing / Cryptographic hash functions / Error detection and correction

FastAD: An Authenticated Directory for Billions of Objects Paul T. Stanton, Benjamin McKeown, Randal Burns, Giuseppe Ateniese Department of Computer Science, Johns Hopkins University ABSTRACT We develop techniques that m

Add to Reading List

Source URL: www.sigops.org

Language: English - Date: 2009-09-28 22:39:23
436Keccak / SHA-2 / SHA-1 / Block cipher / NIST hash function competition / Symmetric-key algorithm / Merkle–Damgård construction / MD4 / Hash function / Cryptography / Error detection and correction / Cryptographic hash functions

Permutation-based symmetric cryptography and Keccak Permutation-based symmetric cryptography and Keccak Joan Daemen1 Joint work with

Add to Reading List

Source URL: passwords12.at.ifi.uio.no

Language: English - Date: 2012-12-02 17:23:46
437Database management systems / Data / Hash join / Hashing / Database theory / Hash function / Sort-merge join / Stack / Data integration / Search algorithms / Computing / Data management

On Producing High and Early Result Throughput in Multi-join Query Plans Justin J. Levandoski, Member, IEEE, Mohamed E. Khalefa, Member, IEEE, and Mohamed F. Mokbel, Member, IEEE Abstract—This paper introduces an effici

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2010-06-27 17:44:37
438Random oracle / Preimage attack / Hash function / MDC-2 / Merkle–Damgård construction / SHA-1 / Oracle machine / SHA-2 / Advantage / Cryptography / Cryptographic hash functions / One-way compression function

A Synthetic Indifferentiability Analysis of Some Block-Cipher-Based Hash Functions∗ Zheng Gong, Xuejia Lai and Kefei Chen Department of Computer Science and Engineering Shanghai Jiaotong University, China neoyan@sjtu.e

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-08-12 04:16:52
439Cryptographic protocols / Strong cryptography / Key / Password / Cryptographic hash function / Digital signature / Cryptanalysis / Cryptosystem / Key generation / Cryptography / Key management / Public-key cryptography

Cryptographic Design Vulnerabilities Strong cryptography is very powerful when it is done right, but it is not a panacea. Focusing on cryptographic algorithms while ignoring other aspects of security is like defending yo

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
440Hash function / Hashcash / Hash list / Hash / Computing / Information / Error detection and correction / Hashing / Search algorithms

HASH HOUSE HARRIERS SINGAPORE FOUNDEDA MEN ONLY RUN) ______________________________________________________________________________________

Add to Reading List

Source URL: www.hhhs.org.sg

Language: English - Date: 2015-02-25 01:13:35
UPDATE