Hash function

Results: 1800



#Item
81Distributed data storage / Email / Internet privacy / Public key infrastructure / Pastry / Simple Mail Transfer Protocol / Distributed hash table / Secure messaging / Short Message Service / Public-key cryptography / Cryptographic hash function

POST: A Secure, Resilient, Cooperative Messaging System Alan Mislove1 Ansley Post1 Dan S. Wallach1

Add to Reading List

Source URL: www.cs.rice.edu

Language: English - Date: 2003-04-12 02:53:53
82Cryptographic hash functions / Cryptography / NIST hash function competition / Stream ciphers / SHA-3 / Hashing / Sponge function / RadioGatn / Gilles Van Assche / Joan Daemen / Hash function / Random oracle

Keccak Guido Bertoni1 Joan Daemen1 Michaël Peeters2 Gilles Van Assche1 1 STMicroelectronics 2 NXP

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English - Date: 2013-09-19 10:37:36
83Routing protocols / Hashing / Error detection and correction / Routing algorithms / Distributed data storage / Hash chain / Routing / Link-state routing protocol / Destination-Sequenced Distance Vector routing / Merkle tree / Cryptographic hash function / Distance-vector routing protocol

Efficient Security Mechanisms for Routing Protocols Yih-Chun Hu Carnegie Mellon University Adrian Perrig

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English - Date: 2015-06-01 09:06:12
84Search algorithms / Trie / HAT-trie / Hash table / Hash function / Set / Search tree / Radix tree / Radix sort

Under consideration for publication in J. Functional Programming 1 A Functional Toolkit for Morphological and Phonological Processing,

Add to Reading List

Source URL: gallium.inria.fr

Language: English - Date: 2004-04-19 09:40:02
85Search algorithms / Hashing / Cache / Arrays / Hash table / Hash join / Hash function / CPU cache / Query optimization / Trie / Join / Database

Forecasting the cost of processing multi-join queries via hashing for main-memory databases

Add to Reading List

Source URL: web.cse.ohio-state.edu

Language: English - Date: 2015-08-14 19:41:23
86NIST hash function competition / SHA-3 / Cryptographic hash functions / Sponge function / Gilles Van Assche / Joan Daemen / Data Encryption Standard / Permutation / Differential cryptanalysis

Keccak sponge function family main document Guido Bertoni1 Joan Daemen1 Micha¨el Peeters2

Add to Reading List

Source URL: keccak.noekeon.org

Language: English - Date: 2013-02-27 15:26:40
87Search algorithms / Hashing / Selection algorithm / Hash function / Randomized algorithm / A* search algorithm / Cryptographic hash function

Distributed Computation of the Mode Fabian Kuhn Institute of Theoretical Computer Science ETH Zurich

Add to Reading List

Source URL: www.tik.ee.ethz.ch

Language: English - Date: 2015-05-18 12:16:08
88Circuit complexity / Complexity classes / Secure multi-party computation / Computational complexity theory / Digital circuits / Circuit / Boolean circuit / CC / Hash function / NC

Reuse It Or Lose It: More Efficient Secure Computation Through Reuse of Encrypted Values Benjamin Mood Yale University

Add to Reading List

Source URL: www.cs.yale.edu

Language: English - Date: 2014-08-25 10:31:08
89Hashing / RabinKarp algorithm / Hash function / Cryptography

CSE 181 Project guidelines

Add to Reading List

Source URL: www.cs.bilkent.edu.tr

Language: English - Date: 2013-10-24 06:35:44
90NIST hash function competition / SHA-3 / Cryptographic hash functions / Hashing / Cryptography / Sponge function / Gilles Van Assche / Joan Daemen / Hash function

Keccak specifications Guido Bertoni1 , Joan Daemen1 , Micha¨el Peeters2 and Gilles Van Assche1 1 STMicroelectronics 2 NXP Semiconductors

Add to Reading List

Source URL: keccak.noekeon.org

Language: English - Date: 2013-02-27 15:26:40
UPDATE