Hash functions

Results: 1148



#Item
201Search algorithms / Hash House Harriers / Hash function / Hash list / Hash / Human behavior / Information retrieval / Artificial intelligence / Error detection and correction / Cryptographic hash functions / Hashing

MOUNT VERNON HASH HOUSE HARRIERS 2015 ANNUAL GENERAL MEETING (AGM) When: Friday 17 April 2015 to Sunday 19 Aprilnights) Where: Dewey Beach, DE Hash hotel: Atlantic Oceanside Motel, 1700 Coastal Hwy, Dewey Beach,

Add to Reading List

Source URL: www.dchashing.org

Language: English - Date: 2014-12-26 18:09:44
202Gaithersburg /  Maryland / National Institute of Standards and Technology / Görtz

Tightly-Secure Signatures from Chameleon Hash Functions NIST, Maryland, PKC 2015 Olivier Blazy1 , Saqib A. Kakvi2 , Eike Kiltz2 , Jiaxin Pan2 1 University of Limoges, France

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2015-03-30 09:20:20
203Hashing / MD5 / Search algorithms / Collision attack / Padding / X.509 / Hash function / RSA / Cryptography / Public-key cryptography / Cryptographic hash functions

Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate Marc Stevens1 , Alexander Sotirov2 , Jacob Appelbaum3 , Arjen Lenstra4,5 , David Molnar6 , Dag Arne Osvik4 , and Benne de Weger7 1

Add to Reading List

Source URL: deweger.xs4all.nl

Language: English
204Public-key cryptography / Error detection and correction / Merkle signature scheme / Digital signature / Hash function / Hash tree / Collision attack / RSA / MD5 / Cryptography / Hashing / Cryptographic hash functions

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-09 11:38:04
205Information science / Artificial intelligence / Tabulation hashing / Hash function / Linear probing / Cuckoo hashing / Cryptographic hash function / Hash list / Universal hashing / Hashing / Search algorithms / Information retrieval

May 2013 MADALGO seminar by Mikkel Thorup, University of Copenhagen The Power of Tabulation Hashing Abstract: Abstract Randomized algorithms are often enjoyed for their simplicity, but the hash functions used to yield

Add to Reading List

Source URL: old-madalgo.au.dk

Language: English - Date: 2013-05-10 08:51:10
206Cut / Lazy Dog / Cryptographic hash functions / Typography / The quick brown fox jumps over the lazy dog / Computing

Microsoft Word - AAI Letter to Sens Carper and Coburn.government spending on conferences

Add to Reading List

Source URL: aai.org

Language: English - Date: 2014-08-04 12:04:02
207Error detection and correction / Cryptography / Information retrieval / Computing / Hash table / Hash function / Rainbow table / NTLM / Hash / Search algorithms / Hashing / Cryptographic hash functions

Advancements in TMTOs Steve Thomas “Sc00bz” Passwords^12 TobTu.com/passwords12 1

Add to Reading List

Source URL: passwords12.at.ifi.uio.no

Language: English - Date: 2012-12-06 12:19:04
208Error detection and correction / Search algorithms / Hash function / MD5 / Collision / SHA-1 / Hash list / Claw-free permutation / Collision attack / Cryptographic hash functions / Cryptography / Hashing

Secure Names for Bit-Strings Stuart Haber* W. Scott Stornetta*

Add to Reading List

Source URL: nakamotoinstitute.org

Language: English - Date: 2014-03-23 11:44:47
209Cryptographic hash functions / Computability theory / Random oracle / Oracle machine / Oracle Corporation / Proof of knowledge / L / Standard model / Oracle Database / Cryptography / Theoretical computer science / Cryptographic protocols

Non Observability in the Random Oracle Model Prabhanjan Ananth and Raghav Bhaskar Microsoft Research India BangaloreAbstract

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-18 23:51:34
210Crypt / SHA-1 / BATON / Key generation / Cryptographic software / NSA cryptography / SHA-2 / Cryptography / Key management / Cryptographic hash functions

MYK-85 Key Management Unit A complete, 32-bit RISC-based cryptographic processor with Baton, DES, and Triple DES in

Add to Reading List

Source URL: www.raytheoncyber.com

Language: English - Date: 2015-04-19 23:42:38
UPDATE