Hash functions

Results: 1148



#Item
251Hashing / Symmetric-key algorithm / RC4 / RC5 / Block cipher / SHA-1 / Crypt / GOST / Cipher / Cryptography / Stream ciphers / Cryptographic hash function

Performance of Block Ciphers and Hash Functions — One Year Later Michael Roe Cambridge University Computer Laboratory, Pembroke Street, Cambridge CB2 3QG, UK Email:

Add to Reading List

Source URL: www.chiark.greenend.org.uk

Language: English - Date: 2010-08-20 09:24:51
252Cryptography / Applied mathematics / Crypt / Field-programmable gate array / Key derivation function / Password / Salt / MD5 / SHA-2 / Cryptographic hash functions / Mathematics / Key management

PRINCE modern password guessing algorithm Why do we need a new attack-mode? FUTURE OF PASSWORD HASHES

Add to Reading List

Source URL: hashcat.net

Language: English - Date: 2014-12-08 07:12:08
253Cryptographic software / Hashing / Block cipher / SHA-1 / Cipher / Cryptographic primitive / Crypt / CRYPTREC / BeeCrypt / Cryptography / Advanced Encryption Standard / Cryptographic hash functions

Performance of Protocols (Extended Abstract) Michael Roe Centre for Communications Systems Research 1

Add to Reading List

Source URL: www.chiark.greenend.org.uk

Language: English - Date: 2010-08-20 09:24:55
254Error detection and correction / Information retrieval / Information science / Cryptographic hash functions / Hash function / Forwarding plane / Hash table / Traffic flow / Count-Min sketch / Hashing / Computing / Search algorithms

pics/optim-cmss-space-0.2-ss1.0.eps

Add to Reading List

Source URL: www-bcf.usc.edu

Language: English - Date: 2013-02-21 14:29:31
255Cryptographic protocols / Hashing / Replay attack / Security token / RSA / SHA-1 / Trusted timestamping / Interlock protocol / Digital signature / Cryptography / Public-key cryptography / Cryptographic hash functions

Automatic Event-Stream Notarization Using Digital Signatures Bruce Schneier John Kelsey

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
256Software / Bitcoin / Peer-to-peer computing / Financial cryptography / Electronic commerce / Proof-of-work system / Peer-to-peer / Public-key cryptography / Electronic money / Computing / Cryptography / Cryptographic hash functions

Permacoin: Repurposing Bitcoin Work for Data Preservation Andrew Miller1 , Ari Juels, Elaine Shi1 , Bryan Parno2 and Jonathan Katz1 1 University of Maryland 2

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2014-05-29 22:16:19
257Search algorithms / Computer performance / Software optimization / Cryptographic hash functions / Error detection and correction / Hash function / Trie / SHA-1 / Algorithm / Computing / Statistics / Computer programming

HyperLogLog in Practice: Algorithmic Engineering of a State of The Art Cardinality Estimation Algorithm Stefan Heule Marc Nunkesser

Add to Reading List

Source URL: stefanheule.com

Language: English - Date: 2015-01-15 03:04:25
258Password / Cryptographic software / S/KEY / One-time password / Cryptographic hash functions / Password strength / Random password generator / Cryptography / Security / Computer security

Functional Programming and Specification Practical 1 This practical exercise is to be completed by 4pm on Tuesday 8th February. It will be marked but the mark will not contribute to the overall mark for the course. Pleas

Add to Reading List

Source URL: homepages.inf.ed.ac.uk

Language: English - Date: 2011-02-04 03:56:19
259ICE / International Data Encryption Algorithm / Cryptographic hash functions / GOST / KASUMI / Cryptography / Block ciphers / Akelarre

Cryptanalysis of Akelarre Niels Ferguson Bruce Schneier DigiCash bv Counterpane Systems Kruislaan 419

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
260Cryptographic hash function / Information retrieval / Information science / Artificial intelligence / Hash / Hash functions / Hash table / Bloom filter / Hashing / Search algorithms / Error detection and correction

Perl versiondocumentation - Hash::Util NAME Hash::Util - A selection of general-utility hash subroutines SYNOPSIS

Add to Reading List

Source URL: perldoc.perl.org

Language: English - Date: 2014-10-03 14:56:23
UPDATE