Hash functions

Results: 1148



#Item
371Search algorithms / Information retrieval / Cryptographic hash functions / Hash function / Hash table / Trie / Rabin–Karp algorithm / Search engine indexing / SHA-1 / Information science / Hashing / Error detection and correction

Extremely Fast Text Feature Extraction for Classification and Indexing George Forman, Evan Kirshenbaum HP Laboratories HPL-2008-91R1 Keyword(s): text mining, text indexing, bag-of-words, feature engineering, feature extr

Add to Reading List

Source URL: www.hpl.hp.com

Language: English - Date: 2008-08-21 19:05:04
372Cryptographic hash functions / Salt / Rainbow table / Password cracking / Password / Dictionary attack / NTLM / Crack / MD5 / Cryptography / Computer security / Cyberwarfare

Enough with the Insanity Dictionary Based Rainbow Tables Matt Weir Florida State University Shmoocon 2009

Add to Reading List

Source URL: www.shmoocon.org

Language: English - Date: 2010-11-01 16:47:40
373Search algorithms / Hashing / Password cracking / PBKDF2 / Salt / Password / Hash function / Crypt / Key derivation function / Cryptography / Cryptographic hash functions / Key management

Lyra2: Password Hashing Scheme with improved security against time-memory trade-offs Marcos A. Simplicio Jr., Leonardo C. Almeida, Ewerton R. Andrade, Paulo C. F. dos Santos, and Paulo S. L. M. Barreto Escola Polit´ecni

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-02-27 11:02:00
374Committees / Consultative Committee for Space Data Systems / Cryptographic hash functions / Key size / Galois/Counter Mode / Advanced Encryption Standard / Block cipher / National Security Agency / SHA-1 / Cryptography / Message authentication codes / CCSDS

Report Concerning Space Data System Standards CCSDS CRYPTOGRAPHIC ALGORITHMS INFORMATIONAL REPORT

Add to Reading List

Source URL: public.ccsds.org

Language: English - Date: 2014-12-18 16:46:56
375MD5 / MD4 / Preimage attack / Collision attack / Differential cryptanalysis / Hash function / RIPEMD / SHA-2 / Merkle–Damgård construction / Cryptographic hash functions / Cryptography / SHA-1

Notes on the Wang et al. 263 SHA-1 Differential Path Martin Cochran ∗ August 24, 2008 Abstract Although advances in SHA-1 cryptanalysis have been made since the 2005 announcement of

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-08-25 02:24:24
376Cryptographic hash functions / Search algorithms / Salt / Password cracking / Password / Crypt / Hash function / SHA-1 / Passwd / Cryptography / Computer security / Error detection and correction

Major Marcell ([removed]) Hacktivity[removed]WRITING YOUR OWN PASSWORD

Add to Reading List

Source URL: marcellmajor.com

Language: English - Date: 2010-09-21 14:07:03
377Computing / Cryptographic hash functions / Computer programming / Hash function / Information retrieval / Thread / Software bug / Determinism / Hash list / Hashing / Error detection and correction / Search algorithms

InstantCheck: Checking the Determinism of Parallel Programs Using On-the-fly Incremental Hashing∗ Adrian Nistor University of Illinois at Urbana-Champaign, USA

Add to Reading List

Source URL: iacoma.cs.uiuc.edu

Language: English - Date: 2010-10-02 00:34:45
378Information retrieval / Hashing / Error detection and correction / Hash functions / Dimension reduction / Locality-sensitive hashing / Jaccard index / Locality preserving hashing / Kullback–Leibler divergence / Search algorithms / Information science / Statistics

Similarity Estimation Techniques from Rounding Algorithms Moses S. Charikar Dept. of Computer Science Princeton University 35 Olden Street

Add to Reading List

Source URL: www.cs.princeton.edu

Language: English - Date: 2004-02-04 10:27:32
379Search algorithms / Computing / Cryptography / Computer programming / Information retrieval / Hash function / Hash tree / SHA-1 / Bin / Hashing / Cryptographic hash functions / Error detection and correction

CADS: Continuous Authentication on Data Streams Stavros Papadopoulos Yin Yang Dimitris Papadias

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2014-03-08 19:35:50
380Cryptographic software / Cryptographic hash functions / X86 architecture / Hashing / Cryptography standards / OpenSSL / SHA-2 / AES instruction set / FIPS 140-2 / Cryptography / Computer architecture / Error detection and correction

ODT Document

Add to Reading List

Source URL: www.openssl.org

Language: English - Date: 2014-11-25 17:47:07
UPDATE