Hash function

Results: 1800



#Item
621Key management / Crypt / Hashing / Bcrypt / Salt / Password / Hash function / Key derivation function / MD5 / Cryptography / Search algorithms / Cryptographic software

CRYPT(3) Library functions CRYPT(3)

Add to Reading List

Source URL: download.openwall.net

Language: English - Date: 2009-09-07 19:42:15
622Hash function / Artificial intelligence / Information retrieval / Information science / Cryptographic hash functions / Regression analysis / Search algorithms / Hashing / Error detection and correction

Case Study 1: Estimating Click Probabilities Tackling  an  Unknown  Number  of   Features  with  Sketching     Machine  Learning  for  Big  Data       CSE547/STAT548,  

Add to Reading List

Source URL: courses.cs.washington.edu

Language: English - Date: 2015-04-06 19:08:06
623Artificial intelligence / Error detection and correction / Hash function / Hash table / Television advertisement / Cryptographic hash function / Search algorithms / Hashing / Information science

Practical Advertisement Detection in Video Du,Jiaen ([removed]) 1. Background Usually there are many advertisements in television. This is not efficient for video

Add to Reading List

Source URL: www.cse.ust.hk

Language: English - Date: 2010-12-14 03:20:21
624Hash function / Artificial intelligence / Information retrieval / Information science / Cryptographic hash functions / Regression analysis / Search algorithms / Hashing / Error detection and correction

Case Study 1: Estimating Click Probabilities Tackling  an  Unknown  Number  of   Features  with  Sketching     Machine  Learning  for  Big  Data       CSE547/STAT548,  

Add to Reading List

Source URL: courses.cs.washington.edu

Language: English - Date: 2015-04-07 15:32:58
625Computing / SHA-2 / London / W postcode area / Bitcoin / Cryptographic nonce / Crypt / Hash function / Cryptography / Cryptographic hash functions / Software

GOLDSTRIKETM 1: COINTERRA’S FIRST GENERATION CRYPTO-CURRENCY PROCESSOR FOR BITCOIN MINING MACHINES Javed Barkatullah, Ph.D., MBA Timo Hanke, Ph.D.

Add to Reading List

Source URL: www.hotchips.org

Language: English - Date: 2014-08-12 14:05:46
626Computing / Information science / Hash join / Hash table / Hash function / Bloom filter / Trie / Cryptographic hash function / Database index / Hashing / Search algorithms / Data management

Memory-Efficient Hash Joins

Add to Reading List

Source URL: www.vldb.org

Language: English - Date: 2014-11-12 16:58:02
627Cryptographic hash functions / Mathematics / Information retrieval / Error detection and correction / Hash function / Hash table / Key derivation function / Tabulation hashing / Rainbow table / Search algorithms / Cryptography / Hashing

STRONGER KEY DERIVATION VIA SEQUENTIAL MEMORY-HARD FUNCTIONS COLIN PERCIVAL Abstract. We introduce the concepts of memory-hard algorithms and sequential memory-hard functions, and argue that in order for key derivation f

Add to Reading List

Source URL: www.tarsnap.com

Language: English - Date: 2013-12-11 18:35:17
628Algorithms / Streaming algorithm / Computer science / Theoretical computer science / Randomized algorithm / Count-Min sketch / Hash function / K-nearest neighbor algorithm / Fast Fourier transform / Mathematics / Search algorithms / Applied mathematics

References for Data Stream Algorithms Graham Cormode July[removed]Abstract Many scenarios, such as network analysis, utility monitoring, and financial applications,

Add to Reading List

Source URL: dimacs.rutgers.edu

Language: English - Date: 2008-07-04 21:18:49
629Collision attack / Preimage attack / Spectral Hash / Hash function / Collision / NIST hash function competition / Oracle machine / Cryptography / Cryptographic hash functions / Random oracle

Preimage Attacks Against Spectral Hash and PTX Functions. Ethan Heilman Boston University ABSTRACT

Add to Reading List

Source URL: tinytocs.org

Language: English - Date: 2015-03-07 12:34:01
630Artificial intelligence / Locality-sensitive hashing / Hash function / Hash table / Nearest neighbor search / Tiny Encryption Algorithm / Cryptographic hash function / Search algorithms / Information science / Information retrieval

SK-LSH : An Efficient Index Structure for Approximate Nearest Neighbor Search Yingfan Liu‡ , Jiangtao Cui‡ , Zi Huang§ , Hui Li‡ , Heng Tao Shen§ ‡ School of Computer, Xidian University, China

Add to Reading List

Source URL: www.vldb.org

Language: English - Date: 2014-04-05 17:13:23
UPDATE