Hash function

Results: 1800



#Item
711Semantic similarity / Search engine indexing / Hash function / Principal component analysis / Hash table / Relevance / Trie / Video search engine / Information science / Information retrieval / Search algorithms

1 Scalable Mobile Video Retrieval with Sparse Projection Learning and Pseudo Label Mining Guan-Long Wu, Yin-Hsi Kuo, Tzu-Hsuan Chiu, Winston H. Hsu, and Lexing Xie Abstract

Add to Reading List

Source URL: users.cecs.anu.edu.au

Language: English - Date: 2013-08-18 10:17:33
712LOKI / Khufu and Khafre / Lucifer / Ciphertext / Advanced Encryption Standard / REDOC / Padding / Cryptanalysis / Cryptographic hash function / Cryptography / Differential cryptanalysis / Block cipher

Microsoft Word - Klima_SPI_2007_EN

Add to Reading List

Source URL: cryptography.hyperlink.cz

Language: English - Date: 2007-05-05 06:57:26
713Hashing / Search algorithms / Hash function / Preimage attack / SHA-1 / Collision attack / HMAC / SHA-2 / Merkle–Damgård construction / Cryptographic hash functions / Cryptography / Error detection and correction

Generic collision attacks on narrow-pipe hash functions faster than birthday paradox, applicable to MDx, SHA-1, SHA-2, and SHA-3 narrow-pipe candidates Vlastimil Klima1 and Danilo Gligoroski2 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-08-04 14:03:01
714Matrices / Matrix / Invertible matrix / Rank / Identity matrix / Logical matrix / Algebra / Linear algebra / Mathematics

A Note on Linear Approximations of BLUE MIDNIGHT WISH Cryptographic Hash Function Vlastimil Klima1 and Petr Susil2 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-09-15 19:22:21
715MD2 / C programming language / MD4 / MD5 / Pointer / Cryptographic hash function / Sizeof / Ip / C / Computing / Computer programming / Software engineering

Network Working Group Request for Comments: 1319 Updates: RFC 1115 B. Kaliski RSA Laboratories

Add to Reading List

Source URL: www.rfc-editor.org

Language: English - Date: 2002-03-27 15:08:33
716Hashing / Randomness / Information theory / Search algorithms / Entropy / SHA-2 / Hash function / HMAC / SHA-1 / Cryptography / Error detection and correction / Cryptographic hash functions

Practical consequences of the aberration of narrow-pipe hash designs from ideal random functions Danilo Gligoroski1 and Vlastimil Klima2 1 Faculty of Information Technology, Mathematics and Electrical Engineering,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-07-31 05:53:00
717Advanced Encryption Standard / Ciphertext / Cryptographic hash functions / Stream ciphers / One-way compression function / Cryptography / Block cipher / Transposition cipher

Microsoft Word - DN_HDN_EN.doc

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-02-14 11:21:26
718Hashing / Error detection and correction / Hash function / Collision attack / Padding / Espionage / Cyberwarfare / Information retrieval / Cryptographic hash functions / Cryptography / Search algorithms

formát Název-moje šablona pro docy

Add to Reading List

Source URL: cryptography.hyperlink.cz

Language: English - Date: 2008-11-18 20:27:25
719NIST hash function competition / Hash function / Rotational cryptanalysis / Cryptanalysis / Threefish / SHA-1 / Cryptography / Cryptographic hash functions / Hashing

A framework for Measuring and Evaluating the Progress of the Cryptanalysis of the Hash Function Blue Midnight Wish The Blue Midnight Wish team November 15, 2010

Add to Reading List

Source URL: people.item.ntnu.no

Language: English - Date: 2010-11-15 08:00:24
720Computing / VMDK / CPU cache / Hash table / Cache / Virtual machine / Hash function / System software / VMware / Software

View Storage Accelerator in VMware® View™ 5.1 Leveraging the Content-Based Read Cache in VMware vSphere™ 5.0 within VMware View 5.1 T E C H N I C A L W H I T E PA P E R

Add to Reading List

Source URL: www.vmware.com

Language: English - Date: 2012-10-24 10:14:20
UPDATE