Hash function

Results: 1800



#Item
681Search algorithms / Hashing / Password cracking / PBKDF2 / Salt / Password / Hash function / Crypt / Key derivation function / Cryptography / Cryptographic hash functions / Key management

Lyra2: Password Hashing Scheme with improved security against time-memory trade-offs Marcos A. Simplicio Jr., Leonardo C. Almeida, Ewerton R. Andrade, Paulo C. F. dos Santos, and Paulo S. L. M. Barreto Escola Polit´ecni

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-02-27 11:02:00
682Artificial intelligence / Locality-sensitive hashing / Nearest neighbor search / Hamming distance / K-nearest neighbor algorithm / Hash function / Hamming / Search algorithms / Information science / Mathematics

Mapping-based Techniques Algorithms for Nearest Neighbor Search: Lecture 3 Yury Lifshits http://yury.name Steklov Institute of Mathematics at St.Petersburg California Institute of Technology

Add to Reading List

Source URL: simsearch.yury.name

Language: English - Date: 2007-09-11 19:13:44
683Recreation / Rogaining / Running / Control point / Course / Compass / Hash function / Rallying / Orienteering / Navigation / Sports

The Rogaine Guide For someone new to our sport, knowing what to do to prepare and compete in a rogaine can be a little intimidating. We want you to have a safe and enjoyable event so we’ve prepared this short guide to

Add to Reading List

Source URL: act.rogaine.asn.au

Language: English - Date: 2007-10-31 02:12:37
684MD5 / MD4 / Preimage attack / Collision attack / Differential cryptanalysis / Hash function / RIPEMD / SHA-2 / Merkle–Damgård construction / Cryptographic hash functions / Cryptography / SHA-1

Notes on the Wang et al. 263 SHA-1 Differential Path Martin Cochran ∗ August 24, 2008 Abstract Although advances in SHA-1 cryptanalysis have been made since the 2005 announcement of

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-08-25 02:24:24
685Cryptographic hash functions / Search algorithms / Salt / Password cracking / Password / Crypt / Hash function / SHA-1 / Passwd / Cryptography / Computer security / Error detection and correction

Major Marcell ([removed]) Hacktivity[removed]WRITING YOUR OWN PASSWORD

Add to Reading List

Source URL: marcellmajor.com

Language: English - Date: 2010-09-21 14:07:03
686Hash function / Determinism / Æ / Science / Linguistics / Artificial intelligence / Search algorithms / Causality / Error detection and correction

Microsoft PowerPoint - micro.v03.adi

Add to Reading List

Source URL: iacoma.cs.uiuc.edu

Language: English - Date: 2010-12-23 16:42:44
687Computing / Cryptographic hash functions / Computer programming / Hash function / Information retrieval / Thread / Software bug / Determinism / Hash list / Hashing / Error detection and correction / Search algorithms

InstantCheck: Checking the Determinism of Parallel Programs Using On-the-fly Incremental Hashing∗ Adrian Nistor University of Illinois at Urbana-Champaign, USA

Add to Reading List

Source URL: iacoma.cs.uiuc.edu

Language: English - Date: 2010-10-02 00:34:45
688Mathematics / Information retrieval / 3SUM / Universal hashing / Hash table / Hash function / Big O notation / Linear hashing / Bloom filter / Search algorithms / Hashing / Theoretical computer science

Subquadratic Algorithms for 3SUM Ilya Baran Erik D. Demaine Mihai Pˇatra¸scu

Add to Reading List

Source URL: www.mit.edu

Language: English - Date: 2006-01-19 12:37:57
689Notary / Electronic commerce / Digital signature / Non-repudiation / Public key infrastructure / Electronic signature / Cryptographic hash function / Public key certificate / Electronic business / Cryptography / Public-key cryptography / Key management

Singapore Journal of International & Comparative Law[removed]pp 183–200 Digital Signatures, Certification Authorities: Certainty in the Allocation of Liability Yee Fen Lim∗

Add to Reading List

Source URL: www.commonlii.org

Language: English - Date: 2010-03-01 06:47:15
690Information / Databases / Hash table / Hash function / Database index / Trie / Search engine indexing / Database storage structures / Bloom filter / Information science / Search algorithms / Information retrieval

Dynamic Indexability and the Optimality of B-trees and Hash Tables Ke Yi Hong Kong University of Science and Technology Dynamic Indexability and Lower Bounds for Dynamic One-Dimensional

Add to Reading List

Source URL: www.cse.ust.hk

Language: English - Date: 2011-12-13 21:47:13
UPDATE