Hash function

Results: 1800



#Item
71Internet Standards / Internet protocols / Cryptographic protocols / Character encoding / Public key infrastructure / String / Lightweight Directory Access Protocol / Null / Online Certificate Status Protocol / Data type / Hash function / Value

KEK GRID CA Certificate and CRL Profile VerMay 30, 2016

Add to Reading List

Source URL: gridca.kek.jp

Language: English - Date: 2016-05-25 03:17:59
72Search algorithms / Hashing / Selection algorithm / Hash function / Randomized algorithm / A* search algorithm / Cryptographic hash function

Distributed Computation of the Mode Fabian Kuhn Institute of Theoretical Computer Science ETH Zurich

Add to Reading List

Source URL: disco.ethz.ch

Language: English - Date: 2014-09-26 08:36:27
73Cryptography / Schnorr signature / Random oracle / Optimal asymmetric encryption padding / Cryptographic hash function / Digital signature / Oracle machine / Hash function / Oracle Database / Padding

Microsoft PowerPoint - NPROM-zhang.pptx

Add to Reading List

Source URL: security-lab.jaist.ac.jp

Language: English - Date: 2015-11-22 02:25:26
74Search algorithms / Hashing / Cuckoo hashing / Hash function / 2-choice hashing / Locality-sensitive hashing

Algorithms and Data Structures Winter TermExercises for Unit 11 s 1. For this question assume we have n buckets, B1 , . . . , Bn , initially empty, and an unlimited

Add to Reading List

Source URL: www-tcs.cs.uni-sb.de

Language: English - Date: 2016-03-07 07:14:38
75Compiler optimizations / Search algorithms / Arrays / Global value numbering / Static single assignment form / Hash function / Hash table / Algorithm / Lookup table / Congruence

This talk is divided into 7 parts. Part 1 begins with a quick look at the SSA optimization framework and global value numbering. Part 2 describes a well known brute force algorithm for GVN. Part 3 modifies this to arriv

Add to Reading List

Source URL: www.sable.mcgill.ca

Language: English - Date: 2009-03-09 09:18:56
76Abstract data types / Search algorithms / Hashing / Arrays / Hash table / Collection / Garbage collection / Sorting algorithm / Ruby / Algorithm / Hash function / Trie

Data Structures and Algorithms with Object-Oriented Design Patterns in Ruby Data Structures and Algorithms with Object-Oriented Design Patterns in Ruby

Add to Reading List

Source URL: www.brpreiss.com

Language: English - Date: 2014-07-08 21:38:40
77Error detection and correction / Hashing / Cryptographic hash functions / Search algorithms / Malware / Malware analysis / Computer virus / Antivirus software / Hash function / MD5 / Hash list / Crypt

Proceedings Template - WORD

Add to Reading List

Source URL: womencourage.acm.org

Language: English - Date: 2016-08-09 09:13:52
78Search algorithms / Hashing / Functions and mappings / Topology / Dynamic perfect hashing / Function / Universal hashing / Hash table / Set / Hash function / Binary relation / Surjective function

Microsoft Word - NLA-monographdoc

Add to Reading List

Source URL: foibg.com

Language: English - Date: 2015-06-14 11:43:50
79NIST hash function competition / Cryptographic hash functions / SHA-3 / Hashing / Cryptography / Application-specific integrated circuit / Institute for Applied Information Processing and Communications / Crypt / Zorro

Side-Channel Analysis of the Zorro ASIC Advisor(s): Thomas Korak Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-09-08 06:00:03
80Search algorithms / Feature detection / Hashing / Error detection and correction / Bloom filter / Hash function / Sobel operator / Peak signal-to-noise ratio / Prewitt operator / Memristor / Hash table

Resistive Bloom Filters: From Approximate Membership to Approximate Computing with Bounded Errors ∗ Department † Department

Add to Reading List

Source URL: mesl.ucsd.edu

Language: English - Date: 2015-12-02 16:27:13
UPDATE