Hash functions

Results: 1148



#Item
651Error detection and correction / Cryptography / Computing / Security / Hash tree / Venti / Trusted Platform Module / Cache / Hash list / Hashing / Computer security / Cryptographic hash functions

Authenticated Storage Using Small Trusted Hardware Hsin-Jung Yang, Victor Costan, Nickolai Zeldovich, and Srinivas Devadas Computer Science and Artificial Intelligence Laboratory Massachusetts Institute of Technology Cam

Add to Reading List

Source URL: people.csail.mit.edu

Language: English
652Digital libraries / Library science / Preservation / Museology / Hashing / Digital preservation / Checksum / BagIt / SHA-2 / Error detection and correction / Archival science / Cryptographic hash functions

Draft Fact Sheet NDSA Infrastructure &Standards Working Groups Checking Your Digital Content: How, What and When to Check Fixity? How do I know what I have and the file/object is not corrupted, changed or altered?

Add to Reading List

Source URL: blogs.loc.gov

Language: English - Date: 2014-02-05 15:41:04
653Cryptographic hash functions / Cryptographic protocols / Computing / MD5 / Password / Cryptography

Security Advisory SA2013-093

Add to Reading List

Source URL: doa.alaska.gov

Language: English - Date: 2013-11-15 19:32:15
654Search algorithms / Error detection and correction / Collision attack / Merkle–Damgård construction / Preimage attack / Hash function / Digital signature / SHA-1 / MD5 / Cryptography / Cryptographic hash functions / Hashing

Provable Security – Proceedings of ProvSec ’08 (October 30–November 1, Shangai, CN) J. Baek, F. bao, K. Chen and X. Lai, Eds. Springer-Verlag, LNCS 5324, pages 241–253. How to use Merkle-Damgård — On the Secur

Add to Reading List

Source URL: www.ssi.gouv.fr

Language: English - Date: 2012-11-06 05:29:19
655Computing / Cryptographic hash functions / Information / Internet protocols / Internet standards / Hash tree / Hash list / Hash function / Transport Layer Security / Hashing / Error detection and correction / Cryptography

Merkle Tree Authentication of HTTP Responses Roberto J. Bayardo Jeffrey Sorensen IBM Almaden Research Center

Add to Reading List

Source URL: www2005.org

Language: English - Date: 2005-04-05 14:58:32
656Electronics / Mathematics / Bloom filter / Filter theory / Cryptographic hash functions / Hash function / MD5 / Filter / Electronic filter / Hashing / Cryptography / Search algorithms

An Examination of Bloom Filters and their Applications Jacob Honoroff March 16, 2006 Outline

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2008-08-14 14:22:09
657Preimage attack / NIST hash function competition / Hash function / Cryptography / Cryptographic hash functions / Hashing

outbind://31-00000000C28D6AD45D681F4D837CF97C3377EF1B0700D7A042

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-07 14:15:46
658Hashing / System software / Search algorithms / Data synchronization / Rsync / MD5 / Hash function / Andrew Tridgell / Rolling hash / Error detection and correction / Computing / Cryptographic hash functions

ManTech International Computer Forensics and Intrusion Analysis Fuzzy Hashing Jesse Kornblum

Add to Reading List

Source URL: jessekornblum.com

Language: English - Date: 2009-01-16 06:23:00
659Daniel J. Bernstein / Cryptographic hash functions / NIST hash function competition / Hash function

Microsoft Office Outlook - Memo Style

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-07 13:47:18
660Advanced Encryption Standard / Tiny Encryption Algorithm / Differential cryptanalysis / Grøstl / Crypt / Collision attack / Threefish / Cryptography / Cryptographic hash functions / NIST hash function competition

Microsoft Office Outlook - Memo Style

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-30 12:26:50
UPDATE