Hash function

Results: 1800



#Item
801Merkle–Damgård construction / Birthday attack / Hash function / One-way compression function / Preimage attack / Cryptography / Cryptographic hash functions / Message authentication codes

Cryptanalysis on a Merkle-Damgård Based MAC Almost Universal Forgery and Distinguishing-H Attacks Yu Sasaki (NTT Corporation[removed] @ Eurocrypt 2012

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2012-04-20 07:04:20
802Computing / MD5 / Hashing / Function / Qi / Cryptography / Mathematics / Cryptographic hash functions

A Study of the MD5 Attacks: Insights and Improvements John Black and Martin Cochran University of Colorado Trevor Highland University of Texas

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2006-04-18 10:40:57
803Search algorithms / Random oracle / Preimage attack / MDC-2 / Hash function / Block cipher modes of operation / Birthday attack / Collision attack / One-way compression function / Cryptography / Cryptographic hash functions / Hashing

FSE[removed]17, Graz) Some Plausible Constructions of Double-Block-Length Hash Functions Shoichi Hirose

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2006-04-18 10:40:57
804Information theory / Pseudorandomness / Random number generation / Hardware random number generator / National Security Agency / Cryptographic hash function / Entropy / Block cipher / Cryptographically secure pseudorandom number generator / Cryptography / Randomness / Pseudorandom number generators

NIST Special Publication[removed]Recommendation for Random Number Generation Using Deterministic Random Bit Generators Elaine Barker

Add to Reading List

Source URL: web.archive.org

Language: English
805Information retrieval / Hash function / Locality-sensitive hashing / K-nearest neighbor algorithm / Nearest neighbor search / Hash table / Cryptographic hash function / Machine learning / Search algorithms / Information science / Artificial intelligence

In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), June[removed]Fast Image Search for Learned Metrics Prateek Jain Brian Kulis Kristen Grauman Department of Computer Sciences Universi

Add to Reading List

Source URL: www.cs.utexas.edu

Language: English - Date: 2008-08-10 18:06:43
806Cryptographic hash functions / HMAC / SHA-1 / MD5 / Collision attack / Hash function / MD4 / Collision resistance / SHA-2 / Error detection and correction / Cryptography / Hashing

Journal of Universal Computer Science, vol. 14, no[removed]), [removed]submitted: 2/6/07, accepted: [removed], appeared: 1/2/08 © J.UCS New Results on NMAC/HMAC when Instantiated with Popular Hash Functions Christian Rechb

Add to Reading List

Source URL: www.jucs.org

Language: English - Date: 2008-09-17 07:43:00
807Hashing / Quadratic probing / Software engineering / Associative arrays / Hash table / Sequence container / Hash function / Set / Lookup table / Computing / Search algorithms / Computer programming

Microsoft Word - Hash.h.docx

Add to Reading List

Source URL: digital.cs.usu.edu

Language: English - Date: 2010-10-05 14:53:24
808Sorting algorithms / Search algorithms / Searching / Indexing / Search engine indexing / Heapsort / Algorithm / Hash function / Heap / Information science / Information retrieval / Science

Microsoft Word - Uniform Course Syllabus CS 221.doc

Add to Reading List

Source URL: www.wvup.edu

Language: English - Date: 2013-07-26 17:11:09
809Security / Cryptography / Information / Identifiers / Acoustic fingerprint / Digital video fingerprinting / Public key fingerprint / Shazam / Hash function / Acoustic fingerprinting / Biometrics / Fingerprints

A Highly Robust Audio Fingerprinting System A Highly Robust Audio Fingerprinting System Jaap Haitsma Ton Kalker

Add to Reading List

Source URL: ismir2002.ismir.net

Language: English - Date: 2014-01-23 12:56:14
810Information retrieval / Artificial intelligence / Hash table / Hash function / Heap / Big O notation / Linear probing / Search algorithms / Hashing / Information science

Introduction to Algorithms: 6.006 Massachusetts Institute of Technology Professors Srini Devadas and Erik Demaine March 7, 2008 Handout 6

Add to Reading List

Source URL: courses.csail.mit.edu

Language: English - Date: 2008-03-07 01:43:43
UPDATE