Hash function

Results: 1800



#Item
491Mathematics / NIST hash function competition / NaSHA / Quasigroup

Collision attack on NaSHA-512 Li Ji1 , Xu Liangyu1 , and Guan Xu2 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-02-23 05:49:39
492Exponentials / Gaussian function / Normal distribution / Lattice / Multivariate normal distribution / Random matrix / Vector space / Algebra / Mathematics / Abstract algebra

Discrete Gaussian Leftover Hash Lemma over Infinite Domains Shweta Agrawal ? , Craig Gentry ?? , Shai Halevi ? ? ? , and Amit Sahai† Abstract. The classic Leftover Hash Lemma (LHL) is one of the most useful tools in cr

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-03-22 00:09:18
493Internet protocols / Secure communication / PKCS / Cryptographic hash function / Cipher suite / Crypto++ / MD4 / SHA-2 / Transport Layer Security / Cryptography / Cryptographic software / Cryptography standards

  CycloneCrypto is a cryptographic toolkit designed for use in embedded systems. It provides a comprehensive set of

Add to Reading List

Source URL: www.oryx-embedded.com

Language: English - Date: 2015-01-25 07:33:55
494MD5 / MD4 / HAVAL / Wang Xiaoyun / X.509 / Hash function / Collision / MD2 / Cryptography / Cryptographic hash functions / Hashing

Finding MD5 Collisions – a Toy For a Notebook Vlastimil Klíma 1 Prague, Czech Republic http://cryptography.hyperlink.cz March 5, 2005

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-03-08 12:38:58
495Search algorithms / Coding theory / Information theory / Mathematics / Information retrieval / Hash function / Online codes / Hash list / Hash tree / Cryptographic hash functions / Error detection and correction / Hashing

On-the-Fly Verification of Rateless Erasure Codes for Efficient Content Distribution Maxwell N. Krohn Michael J. Freedman

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2004-02-29 16:05:25
496Information science / Artificial intelligence / Hash table / Hash join / Hash function / Block nested loop / Trie / Search algorithms / Hashing / Information retrieval

Hash-Merge Join: A Non-blocking Join Algorithm for Producing Fast and Early Join Results∗ Mohamed F. Mokbel Ming Lu

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2009-09-29 10:22:41
497Search algorithms / SQL / Data / Information retrieval / Hash join / Hash function / Join / Database / Throughput / Database management systems / Data management / Hashing

1 PermJoin: An Efficient Algorithm for Producing Early Results in Multi-join Query Plans Justin J. Levandoski

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2009-09-29 10:22:40
498Hashing / Mathematics / Cryptography / Error detection and correction / Randomized algorithm / Linear probing / Hash table / Hash function / Algorithm / Search algorithms / Applied mathematics / Theoretical computer science

Derandomization, Hashing and Expanders ´ Milan Ruˇ zic A PhD Dissertation

Add to Reading List

Source URL: www.itu.dk

Language: English - Date: 2011-09-30 03:17:26
499Preimage attack / Hashing / Search algorithms / MD5 / SHA-1 / Image / SHA-2 / Collision resistance / Function / Cryptographic hash functions / Cryptography / Mathematics

Improved (Pseudo) Preimage Attack and Second Preimage Attack on Round-Reduced Grøstl Jian Zou, Wenling Wu, Shuang Wu, and Le Dong Institute of Software Chinese Academy of Sciences Beijing, China

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-10 07:37:20
500Hashing / Cryptographic hash functions / Trusted third party / Hash list / Hash function / Digital signature / RSA / Cryptography / Public-key cryptography / Error detection and correction

Microsoft PowerPoint - 05-Contract-Signing Protocols.ppt

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2005-01-05 04:11:06
UPDATE