Hash function

Results: 1800



#Item
691RSA / Dining cryptographers problem / Cryptographic hash function / Hash function / XTR / Email / Index of cryptography articles / Cryptography / Public-key cryptography / Electronic commerce

CS255: Cryptography and Computer Security Winter 1998 Final Exam

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2001-03-05 14:35:42
692Public-key cryptography / Internet protocols / Homomorphic encryption / Secret sharing / HMAC / Encryption / Cryptographic hash function / Wireless sensor network / Database / Cryptography / Cryptographic protocols / Hashing

Secure and Efficient In-Network Processing of Exact SUM Queries Stavros Papadopoulos 1 , Aggelos Kiayias 2 , Dimitris Papadias 3 1 Department of Computer Science and Engineering

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2014-03-08 19:35:45
693Search algorithms / Computing / Cryptography / Computer programming / Information retrieval / Hash function / Hash tree / SHA-1 / Bin / Hashing / Cryptographic hash functions / Error detection and correction

CADS: Continuous Authentication on Data Streams Stavros Papadopoulos Yin Yang Dimitris Papadias

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2014-03-08 19:35:50
694RSA / Dining cryptographers problem / Cryptographic hash function / Hash function / XTR / Email / Index of cryptography articles / Cryptography / Public-key cryptography / Electronic commerce

CS255: Cryptography and Computer Security Winter 1998 Final Exam

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2000-03-02 16:04:37
695Electronic signature / Cryptographic hash function / Hysteresis / Elliptic Curve DSA / Signature / SHA-1 / Message authentication code / RSA / ElGamal signature scheme / Cryptography / Public-key cryptography / Digital signature

3-11 Hysteresis Signature and Its Related Technologies to Maintain the Digital Evidence for Network Activities in Future Society TOYOSHIMA Hisashi and MIYAZAKI Kunihiko Security Requirements are varied with rapid growth

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2013-11-21 18:59:46
696Theoretical computer science / Applied mathematics / Error detection and correction / Quantum key distribution / Computer arithmetic / Cryptographic hash function / Hash function / Hamming / MD5 / Cryptography / Quantum information science / Quantum cryptography

3-7 Error Detection and Authentication in Quantum Key Distribution YAMAMURA Akihiro and ISHIZUKA Hirokazu Detecting errors in a raw key and authenticating a private key are crucial for quantum key distribution schemes. O

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2013-11-21 18:58:38
697Entropy / SHA-2 / Preimage attack / SHA-1 / Hash function / HMAC / Padding / NIST hash function competition / Leftover hash lemma / Cryptographic hash functions / Error detection and correction / Cryptography

Paragraph[removed]of the Code of Ethics Estate agents and salespersons should be fully conversant with the EAO, its subsidiary legislation, this Code of Ethics, and other guidelines issued by the EAA from time to time and

Add to Reading List

Source URL: text.eaa.org.hk

Language: English - Date: 2013-07-22 00:20:20
698Entropy / SHA-2 / Preimage attack / SHA-1 / Hash function / HMAC / Padding / NIST hash function competition / Leftover hash lemma / Cryptographic hash functions / Error detection and correction / Cryptography

Why narrow-pipe cryptographic hash functions are not a match to wide-pipe cryptographic hash functions? Danilo Gligoroski [removed] Faculty of Information Technology, Mathematics and Electrical Engin

Add to Reading List

Source URL: cryptography.hyperlink.cz

Language: English - Date: 2010-12-04 13:55:47
699Search algorithms / Ensemble learning / Resampling / Bootstrapping / SAS / Bootstrap aggregating / Hash function / Hash table / Algorithm / Statistics / Computational statistics / Statistical inference

Much Faster Bootstraps Using SAS® John Douglas (“J.D.”) Opdyke,* DataMineIt Abstract Seven bootstrap algorithms coded in SAS® are compared. The fastest (“OPDY”), which uses no modules beyond Base SAS®, achieve

Add to Reading List

Source URL: www.datamineit.com

Language: English - Date: 2010-11-02 10:36:52
700Search algorithms / Diagrams / Discrete geometry / Nearest neighbor search / Vector space model / MinHash / Hash function / Binary decision diagram / K-d tree / Information science / Science / Information retrieval

School of Computer Science College of Engineering and Computer Science Nearest Neighbour Search with Zero-Suppressed Decision Diagram for Text Retrieval

Add to Reading List

Source URL: users.cecs.anu.edu.au

Language: English - Date: 2014-11-14 04:01:13
UPDATE