Hash functions

Results: 1148



#Item
141Error detection and correction / Computer file formats / Search algorithms / Cryptographic hash functions / Hash list / Hash function / File system / File format / Windows Registry / Computing / Hashing / System software

SimHash: Hash-based Similarity Detection Caitlin Sadowski University of California, Santa Cruz Greg Levin

Add to Reading List

Source URL: simhash.googlecode.com

Language: English - Date: 2007-12-13 05:28:46
142Error detection and correction / Security / Information / Search algorithms / Fingerprint / Identifiers / Hash function / Public key fingerprint / Rabin–Karp algorithm / Hashing / Cryptography / Cryptographic hash functions

Winnowing: Local Algorithms for Document Fingerprinting Saul Schleimer Daniel S. Wilkerson Alex Aiken

Add to Reading List

Source URL: dsw.users.sonic.net

Language: English - Date: 2015-06-08 15:50:28
143Hashing / Computing / Information retrieval / Cryptography / Causality / Version vector / Hash table / Hash function / SHA-1 / Search algorithms / Mathematics / Cryptographic hash functions

Appears in Proceedings of the 23rd IEEE International Conference on Distributed Computing Systems (ICDCS ’03). The Hash History Approach for Reconciling Mutual Inconsistency Brent ByungHoon Kang, Robert Wilensky and J

Add to Reading List

Source URL: oceanstore.cs.berkeley.edu

Language: English - Date: 2003-03-13 15:50:35
144Bitcoin / Peer-to-peer computing / Payment systems / Financial cryptography / Cryptographic hash functions / Cryptography / Software / Computing

ISSCCIICT 2014, Limerick, June 26–27 Bitcoin Mining and its Energy Footprint Karl J. O’Dwyer† and David Malone∗ Hamilton Institute National University of Ireland Maynooth

Add to Reading List

Source URL: karlodwyer.github.io

Language: English - Date: 2014-06-25 06:07:20
145Cryptographic hash functions / Internet protocols / Secure communication / HMAC / Block cipher / SHA-2 / Symmetric-key algorithm / MD4 / RC4 / Cryptography / Hashing / Cryptographic software

Microsoft PowerPoint - preneel_enisa08v4.ppt

Add to Reading List

Source URL: www.nis-summer-school.eu

Language: English - Date: 2008-10-20 04:40:05
146Computer programming / Abstract data types / Data types / Information retrieval / Cryptographic hash functions / Hash table / Hash function / Associative array / Bit array / Search algorithms / Computing / Hashing

BRICS Basic Research in Computer Science BRICS RSPagh & Rodler: Lossy Dictionaries Lossy Dictionaries

Add to Reading List

Source URL: www.brics.dk

Language: English - Date: 2001-09-06 08:24:05
147

Universal One-Way Hash Functions via Inaccessible Entropy Iftach Haitner1 , Thomas Holenstein2 , Omer Reingold3, , Salil Vadhan4, , and Hoeteck Wee5, 1

Add to Reading List

Source URL: www.cs.tau.ac.il

- Date: 2013-06-11 04:13:06
    148

    BRICS Basic Research in Computer Science BRICS RSR. Pagh: Dispersing Hash Functions Dispersing Hash Functions

    Add to Reading List

    Source URL: www.brics.dk

    Language: English - Date: 2001-02-19 04:19:01
      149

      On collisions of hash functions Turbo SHA-2

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2008-01-01 15:20:21
        150

        non-trivial black-box combiners for collision-resistant hash-functions don’t exist Krzysztof Pietrzak (CWI Amsterdam) Eurocrypt May

        Add to Reading List

        Source URL: www.iacr.org

        Language: English - Date: 2007-06-12 08:51:13
          UPDATE