Hash function

Results: 1800



#Item
841Martin Luther / Software engineering / Hash function / Dutch people / Email / C / Computing / Search algorithms / Desiderius Erasmus

Application Form - Call: 2014 KA2 – Cooperation and Innovation for Good Practices Erasmus+ Strategic Partnerships for Higher Education

Add to Reading List

Source URL: ec.europa.eu

Language: English - Date: 2014-10-22 08:26:11
842Desiderius Erasmus / Dutch people / Christianity / European people / Search algorithms / Error detection and correction / Hash function

Application Form - Call: 2014 KA1 - Learning Mobility of Individuals Erasmus+ Higher education student and staff mobility

Add to Reading List

Source URL: ec.europa.eu

Language: English - Date: 2014-10-22 08:26:06
843Electronic commerce / RSA / Digital signature / Full Domain Hash / Hash function / XTR / Oracle machine / Random oracle / Prime number / Cryptography / Public-key cryptography / Cryptographic hash functions

Security Proof for Partial-Domain Hash Signature Schemes Jean-S´ ebastien Coron Gemplus Card International

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:55
844Hash function / Dutch people / Christianity / European people / Search algorithms / Desiderius Erasmus / Martin Luther

Application Form - Call: 2014 KA1 - Learning Mobility of Individuals Erasmus+ VET learner and staff mobility

Add to Reading List

Source URL: ec.europa.eu

Language: English - Date: 2014-10-22 08:26:09
845Martin Luther / Software engineering / Hash function / Dutch people / Email / C / Computing / Search algorithms / Desiderius Erasmus

Application Form - Call: 2014 KA2 – Cooperation and Innovation for Good Practices Erasmus+ Strategic Partnerships for Adult Learning

Add to Reading List

Source URL: ec.europa.eu

Language: English - Date: 2014-10-22 08:26:11
846Cyberwarfare / Security Target / Common Criteria / Protection Profile / Evaluation Assurance Level / Cryptographic hash function / PKCS / Evaluation / Computer security / Security

Security Target Filkrypto, Release[removed]Document Version: 1.3.1 Sponsor: Tutus Data AB Title

Add to Reading List

Source URL: fmv.se

Language: English - Date: 2011-10-24 10:09:52
847Data / Hashing / Data warehousing / Distributed computing architecture / MapReduce / Parallel computing / Hash function / Hash join / Hash table / Computing / Data management / Search algorithms

Execution Primitives for Scalable Joins and Aggregations in Map Reduce Srinivas Vemuri, Maneesh Varshney, Krishna Puttaswamy, Rui Liu LinkedIn Mountain View, CA

Add to Reading List

Source URL: www.vldb.org

Language: English - Date: 2014-07-26 18:15:07
848Randomness / Key management / Pseudorandomness / Randomness extractor / Key derivation function / Extractor / Random number generation / Cryptographic hash function / Key / Cryptography / Applied mathematics / Theoretical computer science

Cryptographic Extraction and Key Derivation: The HKDF Scheme Hugo Krawczyk∗ Abstract In spite of the central role of key derivation functions (KDF) in applied cryptography, there

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-05-10 19:09:23
849Common Criteria / Evaluation / Keystore / Protection Profile / Security Target / Cryptographic hash function / Cryptography / Computer security / Public-key cryptography

Swedish Certification Body for IT Security Certification Report - Filkrypto 1.0 Issue: 1.0, 2007-Oct-05 Responsible: Anders Staaf

Add to Reading List

Source URL: fmv.se

Language: English - Date: 2011-10-24 10:09:10
850Search algorithms / Computer performance / Software optimization / Cryptographic hash functions / Error detection and correction / Hash function / Trie / SHA-1 / Algorithm / Computing / Statistics / Computer programming

HyperLogLog in Practice: Algorithmic Engineering of a State of The Art Cardinality Estimation Algorithm Stefan Heule Marc Nunkesser

Add to Reading List

Source URL: static.googleusercontent.com

Language: English - Date: 2013-02-06 17:19:53
UPDATE