Hash function

Results: 1800



#Item
721Computing / Search algorithms / Data privacy / Identity management / Privacy / Bloom filter / Hash function / Differential privacy / Internet privacy / Cryptography / Hashing / Ethics

RAPPOR: Randomized Aggregatable Privacy-Preserving Ordinal Response Úlfar Erlingsson Vasyl Pihur

Add to Reading List

Source URL: static.googleusercontent.com

Language: English - Date: 2014-09-20 03:22:20
722Computing / SHA-2 / Hash function / Endianness / Preimage attack / Bit array / Hexadecimal / MD5 / GOST / Error detection and correction / Cryptography / Cryptographic hash functions

Cryptographic Hash Function B LUE M IDNIGHT W ISH Norwegian University of Science and Technology Trondheim, Norway

Add to Reading List

Source URL: people.item.ntnu.no

Language: English - Date: 2009-09-10 07:24:20
723SHA-1 / Preimage attack / MD5 / MD4 / Padding / RIPEMD / Collision attack / Birthday attack / Hash function / Cryptographic hash functions / Cryptography / SHA-2

On Corrective Patterns for the SHA-2 Family Philip Hawkes1 , Michael Paddon1 , and Gregory G. Rose1 Qualcomm Australia, Level 3, 230 Victoria Rd, Gladesville, NSW 2111, Australia {phawkes,mwp,ggr}@qualcomm.com Abstract.

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-08-22 14:38:17
724Merkle–Damgård construction / Information retrieval / Artificial intelligence / Computing / Cryptographic hash functions / NIST hash function competition / Hash function

1 Cryptographic Hash Function EDON-R Presented by Prof. Danilo Gligoroski

Add to Reading List

Source URL: csrc.nist.gov

Language: English
725USB flash drive / Database / Collection / Password / Data management / Computing / Information / Search algorithms / Error detection and correction / Hash function

Microsoft Word - Live Response Change Log[removed]

Add to Reading List

Source URL: www.e-fense.com

Language: English - Date: 2010-09-10 12:56:06
726Hashing / Search algorithms / Preimage attack / Rope / Entailment / Collision attack / Hash function / Logic / Cryptographic hash functions / Cryptography

formát Název-moje šablona pro docy

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-01-02 11:28:32
727Pseudorandom number generators / Secure communication / Cryptographic primitive / Cryptographic engineering / Cryptographically secure pseudorandom number generator / Transport Layer Security / Cryptographic hash function / Side channel attack / Man-in-the-middle attack / Cryptography / Cryptographic software / Cryptographic protocols

Why does cryptographic software fail? A case study and open problems David Lazar, Haogang Chen, Xi Wang, and Nickolai Zeldovich MIT CSAIL if ((err = SSLHashSHA1.update(...)) != 0)

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2015-03-27 16:16:57
728Public-key cryptography / Internet standards / Secure communication / Transport Layer Security / Cipher suite / SHA-2 / Collision attack / SHA-1 / Cryptographic hash function / Cryptography / Cryptographic protocols / Internet protocols

Deploying a New Hash Algorithm Steven M. Bellovin [removed] Columbia University Abstract

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2006-02-09 00:36:39
729Information science / Information retrieval / Hash function / Hash table / Double hashing / Bloom filter / Cuckoo hashing / Search algorithms / Hashing / Artificial intelligence

Computing Iceberg Queries

Add to Reading List

Source URL: www.vldb.org

Language: English - Date: 2006-07-29 01:39:37
730NIST hash function competition / SHA-2 / Vlastimil Klíma / Hash function / Crypt / SHA-1 / Comparison of cryptographic hash functions / Cryptographic hash functions / Cryptography / Hashing

Microsoft PowerPoint - 1_BlueMidnightWish-Presentation-Final.ppt

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-05 10:49:12
UPDATE