Hash function

Results: 1800



#Item
541Checksum / Electronic Common Technical Document / MD5 / Cryptographic hash function / Cksum / Sum / Simple file verification / Computing / Software / Unix

Microsoft Word - File Security - MD5 v1_0-hwm.doc

Add to Reading List

Source URL: estri.ich.org

Language: English - Date: 2012-06-04 19:13:02
542Function / Preimage attack / Image / Inverse function / Valuation / GOST / Mathematics / Cryptography / Cryptographic hash functions

Attacks on Hash Functions based on Generalized Feistel Application to Reduced-Round Lesamnta and SHAviteCharles Bouillaguet1 , Orr Dunkelman2 , Ga¨etan Leurent1 , and Pierre-Alain Fouque1 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-08-22 12:08:36
543SHA-2 / Computing / Computer programming / Mathematics / Cryptographic hash functions / Hash function / SHA-1

Data-Depend Hash Algorithm ZiJie Xu and Ke Xu

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-03-29 20:31:43
544Character encoding / String / Parity of a permutation / Keccak / Cryptographic hash function / Bitcoin / Structure / Hash function / Digital signature / Cryptography / Mathematics / NIST hash function competition

ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER FINAL DRAFT - UNDER REVIEW DR. GAVIN WOOD CO-FOUNDER & LEAD, ETHEREUM PROJECT

Add to Reading List

Source URL: gavwood.com

Language: English - Date: 2015-04-09 07:05:08
545Logic / Data management / Mathematical notation / Tuple / Type theory / Extension / Hash function / Finitary relation / Relation / Mathematics / Relational model / Mathematical logic

PrefJoin: An Efficient Preference-aware Join Operator Mohamed E. Khalefa 1 , Mohamed F. Mokbel 2 , Justin J. Levandoski 3 Department of Computer Science and Engineering, University of Minnesota, Minneapolis, MN, USA 1

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2011-03-19 13:39:03
546Mechanisms / Hash function / Algorithm / Mechanical engineering / Mathematics / Differential

Collision Attack on the Waterfall Hash Function Scott Fluhrer1 1 Cisco Systems

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-18 22:09:35
547Search algorithms / MD4 / Cryptographic hash function / Collision attack / Crypt / Hash function / Q / Cryptography / Hashing / MD5

Fast Collision Attack on MD5 Marc Stevens Department of Mathematics and Computer Science, Eindhoven University of Technology P.O. Box 513, 5600 MB Eindhoven, The Netherlands.

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-03-17 14:14:33
548Information retrieval / Locality-sensitive hashing / Hash function / K-d tree / Search algorithms / Artificial intelligence / Information science

Microsoft PowerPoint - helsinki-2

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2007-08-11 15:06:23
549Cryptographic hash functions / Computer security / Hash tree / Peer-to-peer / Trusted timestamping / Hash function / Digital signature / Hash list / Linked timestamping / Cryptography / Hashing / Error detection and correction

Keyless Signatures’ Infrastructure: How to Build Global Distributed Hash-Trees Ahto Buldas1,2 , Andres Kroonmaa1 , and Risto Laanoja1,2 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-12-15 18:39:49
550Information retrieval / Locality-sensitive hashing / Nearest neighbor search / Hash function / Lsh / Hash table / K-nearest neighbor algorithm / Asterisk / Scattering parameters / Search algorithms / Information science / Artificial intelligence

E2LSH 0.1 User Manual Alexandr Andoni Piotr Indyk June 21, 2005

Add to Reading List

Source URL: www.mit.edu

Language: English - Date: 2005-06-21 14:20:19
UPDATE