Hash function

Results: 1800



#Item
701Internet standards / Internet protocols / Information technology management / Simple Network Management Protocol / System administration / Email / RMON / Cryptographic hash function / Management information base / Computing / Network management / Internet

TM The Simple Times THE QUARTERLY NEWSLETTER OF SNMP TECHNOLOGY, COMMENT, AND EVENTS SM VOLUME 4, NUMBER 1

Add to Reading List

Source URL: www.simple-times.org

Language: English - Date: 1998-03-27 05:07:37
702Information science / Artificial intelligence / Error detection and correction / Hash functions / Hash table / Cryptographic hash functions / Trie / Linked list / Perfect hash function / Hashing / Search algorithms / Information retrieval

VISUAL BASIC COLLECTIONS AND HASH TABLES Thomas Niemann Preface

Add to Reading List

Source URL: epaperpress.com

Language: English - Date: 2014-07-10 21:19:43
703Cryptographic software / Key / Cryptographic hash function / SHA-2 / Digital signature / Key generation / Network Security Services / Cryptography / Key management / Public-key cryptography

Digital Certificate From 1024 to 2048 Insert Your Kenny Lai Name

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2013-01-09 01:36:32
704Hashing / System software / Error detection and correction / Hash table / Hash function / Computer virus / Hash list / COM file / Ar / Computing / Search algorithms / Software

VIRUS BULLETIN www.virusbtn.com MALWARE ANALYSIS MAKING A HASH OF THINGS Peter Ferrie Microsoft, USA

Add to Reading List

Source URL: pferrie.host22.com

Language: English - Date: 2011-09-27 17:18:26
705Cyberwarfare / Security / Applied mathematics / PGP word list / Cryptography / Padding / Cryptographic hash function

A near-collision attack on BLENDER-256

Add to Reading List

Source URL: cryptography.hyperlink.cz

Language: English - Date: 2008-12-19 07:13:31
706Cryptographic software / Key / Cryptographic hash function / SHA-2 / Digital signature / Key generation / Network Security Services / Cryptography / Key management / Public-key cryptography

Digital Certificate From 1024 to 2048 Insert Your Kenny Lai Name

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2013-01-09 01:36:32
707JH / NIST hash function competition

Bus Schedule as of October 1, 2014 AIOI Station - SPring-8 Line Weekdays AIOI

Add to Reading List

Source URL: www.spring8.or.jp

Language: English - Date: 2014-10-07 02:20:11
708Spamming / Password / Security / Computer security / Cryptographic hash function / One-time password / NTLM / Cryptography / Phishing / Social engineering

A Preliminary Scheme for Combating Phishing with Zero Knowledge Authentication Trust is for Suckers Paul Knickerbocker [removed]

Add to Reading List

Source URL: www.cs.uoregon.edu

Language: English - Date: 2007-09-28 18:10:48
709SHA-2 / SHA-1 / MD4 / NIST hash function competition / MD5 / RIPEMD / Hash function / Secure Hash Standard / Crypt / Cryptographic hash functions / Error detection and correction / Cryptography

On the Computational Asymmetry of the S-boxes Present in Blue Midnight Wish Cryptographic Hash Function Danilo Gligoroski1 and Vlastimil Klima2 1 Department of Telematics, Norwegian University of Science and Technology,

Add to Reading List

Source URL: cryptography.hyperlink.cz

Language: English - Date: 2010-04-18 07:19:47
710Search algorithms / B-tree / N-gram / Speech recognition / Hash function / Suffix tree / Trie / B+ tree / Binary search algorithm / Information science / Science / Logic

AS-Index: A Structure For String Search Using n-grams and Algebraic Signatures. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY : 1– Jul[removed]Camelia Constantin1 , C´edric du Mouza2 , Witold Litwin3 , Philippe Rigaux2 , T

Add to Reading List

Source URL: cedric.cnam.fr

Language: English - Date: 2015-01-29 05:43:09
UPDATE