Hash function

Results: 1800



#Item
971Hashing / SHA-1 / MD5 / Collision attack / Hash function / HMAC / Collision / MD2 / SHA-2 / Error detection and correction / Cryptography / Cryptographic hash functions

Malicious Hashing: Eve’s Variant of SHA-1 Ange Albertini1 , Jean-Philippe Aumasson2 , Maria Eichlseder3 , Florian Mendel3 , and Martin Schl¨affer3 1 Corkami, Germany

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-09-03 12:54:02
972Cryptographic protocols / HTTP / Internet standards / Email / Internet protocols / Digest access authentication / MD5 / MIME / Cryptographic hash function / Computing / Internet / Data

Network Working Group Request for Comments: 3230 Category: Standards Track J. Mogul Compaq WRL

Add to Reading List

Source URL: rfc.askapache.com

Language: English
973Information retrieval / Search algorithms / Multivariate statistics / Matrix theory / Hashing / Non-negative matrix factorization / Digital video fingerprinting / Hash function / Search engine indexing / Information science / Mathematics / Linear algebra

Istanbul Technical University at TRECVID 2008 O. Gursoy, B. Gunsel Multimedia Signal Processing and Pattern Recognition Group Department of Electronics and Communications Engineering Istanbul Technical University Maslak/

Add to Reading List

Source URL: www-nlpir.nist.gov

Language: English - Date: 2008-12-03 08:53:57
974Hashing / World Wide Web / Cryptographic hash functions / Real-time web / Cross-platform software / Twitter / TweetDeck / Hash function / Hash list / Error detection and correction / Computing / Software

Twitter Chat & Tour Q&A Q? How do I get started? A: First of all you must have a Twitter account, (go to twitter.com). When a chat/tour is set up a hash tag (#) is assigned. To follow the chat/tour go to your Twitter ho

Add to Reading List

Source URL: www.bannerhealth.com

Language: English - Date: 2014-11-29 00:04:21
975Histogram / Tuple / Hash function / V-optimal histograms / Statistics / Mathematics / Non-parametric statistics

Scalable Histograms on Large Probabilistic Data Mingwang Tang and Feifei Li School of Computing, University of Utah, Salt Lake City, USA {tang, lifeifei}@cs.utah.edu

Add to Reading List

Source URL: www.cs.utah.edu

Language: English - Date: 2014-08-18 11:38:59
976Preimage attack / GOST / SHA-1 / MD5 / SHA-2 / Hash function / Hash table / Function / Collision resistance / Cryptographic hash functions / Error detection and correction / Cryptography

The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function Jian Guo1 , J´er´emy Jean1 , Ga¨etan Leurent2 , Thomas Peyrin1 , and Lei Wang1 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-29 21:47:28
977VMware / Anti-cheat software / Fault-tolerant computer systems / Cheating in video games / PunkBuster / Cheating in online games / Replication / Cryptographic hash function / Hash function / Software / System software / Computing

Accountable Virtual Machines

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2010-09-22 09:13:35
978Crypt / RadioGatún / Provably secure cryptographic hash function / Cryptographic hash functions / Cryptography / Hash function

X-Sieve: CMU Sieve 2.2 Subject: Comments on Hash Function Criteria Date: Fri, 27 Apr[removed]:28:[removed]X-MS-Has-Attach: yes X-MS-TNEF-Correlator: Thread-Topic: Comments on Hash Function Criteria

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:24:16
979CRYPTREC / Collision resistance / Random oracle / Preimage attack / HMAC / Hash function / Crypt / Outline of cryptography / SWIFFT / Cryptography / Cryptographic hash functions / Hashing

X-Sieve: CMU Sieve 2.2 Date: Fri, 27 Apr 2007 16:58:53 +0900 From: Atsuhiro Yamagishi User-Agent: Thunderbird 1.5.0.10 (Windows/20070221) To: hash-function@nist.gov, shu-jen.chang@nist.gov CC: cryptr

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:08:26
980McEliece cryptosystem / Post-quantum cryptography / Semantic security / Chosen-ciphertext attack / Cryptanalysis / Cryptographic hash function / Ciphertext / Niederreiter cryptosystem / Ciphertext indistinguishability / Cryptography / Public-key cryptography / Electronic commerce

A note on CCA2-protected McEliece cryptosystem with a systematic public key Pavol Zajac? UIM FEI STU, Ilkovicova 3, 81219 Bratislava, Slovakia [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-22 04:29:49
UPDATE