Hash functions

Results: 1148



#Item
341Password / Crypt / Cryptographic hash functions / Bcrypt / Salt / Shadow password / Key derivation function / Passwd / Dictionary attack / Cryptography / Cryptographic software / Key management

Issues for Consideration in the Review of Australian Higher Education April 2008 Vision As a peak body of established private providers of longstanding in the higher education sector our vision for higher education in Au

Add to Reading List

Source URL: cophe.edu.au

Language: English - Date: 2013-08-13 02:16:09
342Password / Crypt / Cryptographic hash functions / Bcrypt / Salt / Shadow password / Key derivation function / Passwd / Dictionary attack / Cryptography / Cryptographic software / Key management

THE ADVANCED COMPUTING SYSTEMS ASSOCIATION The following paper was originally published in the Proceedings of the FREENIX Track: 1999 USENIX Annual Technical Conference

Add to Reading List

Source URL: static.usenix.org

Language: English - Date: 1999-06-14 15:28:14
343LOCKSS / Hash list / Transmission Control Protocol / Localhost / Network architecture / Computing / Internet / Cryptographic hash functions / Hashing / Error detection and correction

file:///tmp/voter-bad.txt # Receive a Poll message and create a V3Voter to handle it 19:30:47.331: Debug: 3-V3Voter: ThreadId 3 is SCommRcv: TCP:[]::30:47.332: Debug3: 3-V3Voter: Creating V3 Voter for p

Add to Reading List

Source URL: documents.clockss.org

Language: English - Date: 2014-07-21 13:43:31
344Error detection and correction / Hash function / One-way compression function / Elliptic curve only hash / Cryptography / Cryptographic hash functions / Hashing

CS255: Cryptography and Computer Security Winter 2003 Assignment #2 Due: Wednesday, February 19th, 2003.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2003-02-14 22:08:35
345Artificial intelligence / Universal hashing / Applied mathematics / Hash function / Tabulation hashing / MMH-Badger MAC / Search algorithms / Hashing / Information retrieval

Lecture 9, ThursdayChoosing Hash Functions O Mostly black magic…

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2001-05-09 22:04:03
346Message authentication codes / Hashing / Hash function / MD5 / SHA-1 / Block cipher / Collision resistance / One-way compression function / CBC-MAC / Cryptography / Error detection and correction / Cryptographic hash functions

CS255: Cryptography and Computer Security Winter 2006 Assignment #2 Due: Wednesday, February 22nd, 2006.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2006-02-13 15:01:47
347Hashing / Hash function / MD5 / SHA-1 / Collision resistance / Collision / One-way compression function / Merkle–Damgård construction / Cryptographic hash functions / Error detection and correction / Cryptography

CS255: Cryptography and Computer Security Winter 2007 Assignment #2 Due: Friday, Feb. 23, 2007.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2007-02-17 22:43:38
348Error detection and correction / Message authentication codes / Hash function / ElGamal signature scheme / Hash tree / Digital signature / Collision resistance / One-way compression function / Lamport signature / Cryptography / Cryptographic hash functions / Hashing

CS255: Cryptography and Computer Security Winter 1999 Assignment #3

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 1999-02-22 15:26:53
349Hashing / Hash function / MD5 / SHA-1 / Collision resistance / Collision / One-way compression function / Merkle–Damgård construction / Cryptographic hash functions / Error detection and correction / Cryptography

CS255: Cryptography and Computer Security Winter 2008 Assignment #2 Due: Friday, Feb. 22, 2008.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2008-02-20 19:40:28
350Hashing / Error detection and correction / Hash function / ElGamal signature scheme / Hash tree / Digital signature / Collision resistance / RSA / One-way compression function / Cryptography / Cryptographic hash functions / Public-key cryptography

CS255: Cryptography and Computer Security Winter 2000 Assignment #3

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2000-02-14 15:44:45
UPDATE