Hash function

Results: 1800



#Item
51Computer programming / Computing / Parallel computing / Software engineering / Application programming interfaces / Message Passing Interface / Type theory / C++ / C++ classes / Type signature / MPI / Hash function

Runtime Checking of Datatype Signatures in MPI⋆ William D. Gropp Mathematics and Computer Science Division Argonne National Laboratory Argonne, Illinois 60439

Add to Reading List

Source URL: wgropp.cs.illinois.edu

Language: English - Date: 2016-08-16 11:52:11
52Cryptography / Biometrics / Coding theory / Fuzzy extractor / Private biometrics / Error detection and correction / Password / Public key fingerprint / Cyclic redundancy check / Cryptographic hash function / Matching / Key

Bipartite Biotokens: Definition, Implementation, and Analysis W.J. Scheirer2,1,† and T.E. Boult1,2,†,? 1 Univ. of Colorado at Colorado Springs, Colorado Springs, CO

Add to Reading List

Source URL: vast.uccs.edu

Language: English - Date: 2010-10-23 12:03:49
53NIST hash function competition / SHA-3 / Power analysis / Institute for Applied Information Processing and Communications / Cryptography / Side-channel attack / Algorithm / Mathematics / Science and technology / Science

Parallel vs. Sequential Computations Do they Leak the Same? Advisor(s): Thomas Korak and Hannes Groß Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-11-30 11:00:03
54Cryptography / Cryptographic hash functions / Information retrieval / Search algorithms / Hashing / Permutations / Error detection and correction / Hash function / Advantage / Birthday attack / Parity of a permutation / One-way compression function

An earlier version of this paper appeared in EurocryptSecurity/Efficiency Tradeoffs for Permutation-Based Hashing Phillip Rogaway1 and John Steinberger2 1

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2008-05-26 20:18:15
55Cryptography / NIST hash function competition / Cryptographic hash functions / SHA-3 / Side-channel attack / Power analysis / Crypt

Side-Channel Analysis of an Authenticated Encryption Algorithm Advisor(s): Thomas Korak Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-11-30 11:00:03
56Information science / Hashing / Information retrieval / Search algorithms / Computer programming / Bloom filter / Cuckoo hashing / Hash table / Hash function / Quotient filter / Hash / Linear probing

Cuckoo Filter: Practically Better Than Bloom Bin Fan, David G. Andersen, Michael Kaminsky† , Michael D. Mitzenmacher‡ Carnegie Mellon University, † Intel Labs, ‡ Harvard University {binfan,dga}@cs.cmu.edu, michae

Add to Reading List

Source URL: conferences2.sigcomm.org

Language: English - Date: 2014-12-01 16:58:59
57Information retrieval / Information science / Search algorithms / Hashing / Extendible hashing / Hash table / Linear hashing / Hash function / Hash / Double hashing / Cryptographic hash function / Partition

Hybrid Use of Hashing Techniques for Spatial Data Wayne A. Davis Department of Computing Science The University of Alberta Edmonton, Alberta, Canada T6G 2H1

Add to Reading List

Source URL: mapcontext.com

Language: English - Date: 2008-08-30 01:13:26
58Information science / Information retrieval / Hashing / Information / Search algorithms / Jaccard index / Malware analysis / Malware / Locality-sensitive hashing / Cluster analysis / Hash function / Hierarchical clustering

BitShred: Feature Hashing Malware for Scalable Triage and Semantic Analysis Jiyong Jang David Brumley

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
59Information science / Information retrieval / Data management / Search algorithms / File sharing / Cross-platform software / Database caching / Memcached / Structured storage / Peer-to-peer / Hash function

  Memcache   Tom  Anderson   Outline  

Add to Reading List

Source URL: courses.cs.washington.edu

Language: English - Date: 2016-02-10 14:11:59
60Computing / Parallel computing / MapReduce / Data-intensive computing / Data / Record linkage / Partition / Replication / Hash function

Load Balancing for MapReduce-based Entity Resolution Lars Kolb, Andreas Thor, Erhard Rahm Database Group, University of Leipzig Leipzig, Germany {kolb,thor,rahm}@informatik.uni-leipzig.de

Add to Reading List

Source URL: dbs.uni-leipzig.de

Language: English - Date: 2011-11-29 09:13:03
UPDATE