Hash function

Results: 1800



#Item
481Computing / Disk encryption / Hashing / Search algorithms / Crypt / MD5 / Payment Card Industry Data Security Standard / Tokenization / Hash function / Cryptography / Cryptographic hash functions / Computer security

PROTECTING STORED CARDHOLDER DATA (AN UNOFFICIAL SUPPLEMENT TO PCI DSS V3.0) Rob Chahin — rob[dot]chahin[at]nccgroup[dot]com iSEC Partners, Inc 123 Mission Street, Suite 1020

Add to Reading List

Source URL: www.isecpartners.com

Language: English - Date: 2015-02-18 09:34:54
482Key / Cryptography / Message authentication code / Cryptographic hash function

Cryptographic Support for Secure Logs on Untrusted Machines Bruce Schneier John Kelsey {schneier,kelsey}@counterpane.com Counterpane Systems, 101 East Minnehaha Parkway, Minneapolis, MN 55419

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:31
483Information theory / Fortuna / Key management / Entropy / Random number generation / Pseudorandomness / Cryptographically secure pseudorandom number generator / Cryptographic hash function / Key / Cryptography / Pseudorandom number generators / Randomness

Cryptography Engineering: Design Principles and Practical Applications

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-07 19:29:27
484Computer programming / Search algorithms / Memoization / Lookup table / Associative array / Hash table / Prediction / Hash function / Branch predictor / Computing / Computer performance / Software optimization

Essay Exams: or How to Stop the Grinch from Stealing the Fun Out of Correcting Them Walter Tatara One of the problems with certain essay examination questions is that

Add to Reading List

Source URL: wac.colostate.edu

Language: English - Date: 2002-06-07 09:07:30
485Computer programming / Search algorithms / Memoization / Lookup table / Associative array / Hash table / Prediction / Hash function / Branch predictor / Computing / Computer performance / Software optimization

Return Value Prediction in a Java Virtual Machine Christopher J.F. Pickett Clark Verbrugge School of Computer Science, McGill University Montr´eal, Qu´ebec, Canada H3A 2A7 {cpicke,clump}@sable.mcgill.ca

Add to Reading List

Source URL: www.sable.mcgill.ca

Language: English - Date: 2004-11-04 17:06:28
486Hashing / Hash function / Digital signature / MD5 / Lamport signature / Hash table / Cryptography / Cryptographic hash functions / Search algorithms

Appears in Advances in Cryptology { Crypto 94 Proceedings, Lecture Notes in Computer Science Vol. 839, Springer-Verlag, Y. Desmedt, ed., 1994. Incremental Cryptography: The Case of Hashing and Signing 

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 1998-07-30 11:58:58
487Perl / Data types / Search algorithms / Perl module / Hash function / Array data structure / Array data type / List / Objective-C / Software engineering / Computing / Computer programming

Perl versiondocumentation - perltie NAME perltie - how to hide an object class in a simple variable SYNOPSIS

Add to Reading List

Source URL: perldoc.perl.org

Language: English - Date: 2014-10-03 15:14:32
488Computer programming / Binary arithmetic / Search algorithms / Bitboard / Game artificial intelligence / Board representation / Lookup table / Trie / Hash function / Games / Computer chess / Computing

Microsoft Word - PaulChess Thesis spaced

Add to Reading List

Source URL: www.cs.arizona.edu

Language: English - Date: 2010-09-26 17:52:18
489SHA-2 / SHA-1 / Hash function / Preimage attack / MD5 / MD4 / RIPEMD / NIST hash function competition / One-way compression function / Cryptographic hash functions / Error detection and correction / Cryptography

Dynamic SHA Zijie Xu E-mail: Abstract. In this paper I describe the construction of Dynamic SHA family of cryptographic hash functions. They are built with design

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-11-20 08:25:40
490Hashing / Computing / Software / Bitcoin / Peer-to-peer computing / Hash tree / Hash list / Hash function / Cryptographic nonce / Cryptography / Error detection and correction / Cryptographic hash functions

Bitcoin: A Peer-to-Peer Electronic Cash System Satoshi Nakamoto www.bitcoin.org Abstract. A purely peer-to-peer version of electronic cash would allow online

Add to Reading List

Source URL: www.altcoinfever.com

Language: English - Date: 2014-01-01 18:43:09
UPDATE