Hash function

Results: 1800



#Item
601Software testing / Error detection and correction / Software bugs / Abstract interpretation / Symbolic execution / Malware / Function / Hash function / Block cipher / Mathematics / Computing / Computer programming

Input Generation via Decomposition and Re-Stitching: Finding Bugs in Malware Juan Caballero Pongsin Poosankam

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:28
602Error detection and correction / Hash function / One-way compression function / Elliptic curve only hash / Cryptography / Cryptographic hash functions / Hashing

CS255: Cryptography and Computer Security Winter 2003 Assignment #2 Due: Wednesday, February 19th, 2003.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2003-02-14 22:08:35
603Artificial intelligence / Universal hashing / Applied mathematics / Hash function / Tabulation hashing / MMH-Badger MAC / Search algorithms / Hashing / Information retrieval

Lecture 9, ThursdayChoosing Hash Functions O Mostly black magic…

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2001-05-09 22:04:03
604One-way function / Cryptographic hash function / Commitment scheme / Padding / Digital signature / Cryptography / XTR / RSA

CS255: Cryptography and Computer Security Winter 2015 Assignment #3 Due: Friday, Mar. 13, 2015, by 5pm.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2015-03-07 13:28:44
605Software testing / Error detection and correction / Software bugs / Abstract interpretation / Symbolic execution / Malware / Function / Hash function / Block cipher / Mathematics / Computing / Computer programming

Input Generation via Decomposition and Re-Stitching: Finding Bugs in Malware Juan Caballero Pongsin Poosankam

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2013-09-09 05:44:56
606Message authentication codes / Hashing / Hash function / MD5 / SHA-1 / Block cipher / Collision resistance / One-way compression function / CBC-MAC / Cryptography / Error detection and correction / Cryptographic hash functions

CS255: Cryptography and Computer Security Winter 2006 Assignment #2 Due: Wednesday, February 22nd, 2006.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2006-02-13 15:01:47
607Error detection and correction / Search algorithms / Cryptographic hash function / Hash function / Digital signature / Hash tree / RSA / Crypt / Cryptography / Public-key cryptography / Hashing

CS255: Cryptography and Computer Security Winter 2004 Assignment #4 Due: Friday, March 12th. No late days allowed.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2004-03-03 16:21:52
608Data / Information / Software transactional memory / Lock / Transactional memory / Linearizability / Hash table / Parallel computing / Hash function / Concurrency control / Transaction processing / Data management

Microsoft PowerPoint - HC18.0120.T1.tutorialAM_part2.ppt

Add to Reading List

Source URL: www.hotchips.org

Language: English - Date: 2013-07-27 23:48:32
609Hashing / Hash function / MD5 / SHA-1 / Collision resistance / Collision / One-way compression function / Merkle–Damgård construction / Cryptographic hash functions / Error detection and correction / Cryptography

CS255: Cryptography and Computer Security Winter 2007 Assignment #2 Due: Friday, Feb. 23, 2007.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2007-02-17 22:43:38
610Biometrics / Fingerprints / Search algorithms / Error detection and correction / Rabin fingerprint / Public key fingerprint / Hash function / Cryptographic hash function / SHA-1 / Cryptography / Information science / Information

WWWTrack: Data Mining Session: Similarity Search Detecting Near-Duplicates for Web Crawling Arvind Jain

Add to Reading List

Source URL: www-scf.usc.edu

Language: English - Date: 2012-11-10 17:20:30
UPDATE