Hash functions

Results: 1148



#Item
701Hashing / Pseudorandomness / Key derivation function / Cryptographic hash function / Pseudorandom function family / Key / HMAC / Randomness extractor / Symmetric-key algorithm / Cryptography / Key management / Message authentication codes

NIST SP[removed]Recommendation for Key Derivation Using Pseudorandom Functions (Revised)

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-02-09 13:56:02
702Electronic health record / Information science / SHA-1 / Hash function / Information / Health informatics / Cryptographic hash functions / Health

Microsoft Word[removed]s_Integrity_v1.1.doc

Add to Reading List

Source URL: healthcare.nist.gov

Language: English - Date: 2010-09-24 10:45:34
703SHA-2 / Computing / Cryptographic hash functions / SHA-1 / CTC

CTC PROJECT ALLOCATIONS FOR JUNE 2014 PPNO Project # Program/Year Allocation Amount Prgm’d Amount

Add to Reading List

Source URL: www.dot.ca.gov

Language: English - Date: 2014-06-27 13:16:19
704Hashing / Block cipher / Cryptographic hash functions / Cryptographically secure pseudorandom number generator / Random number generator attack / Cryptography / Randomness / Pseudorandom number generators

Five DRBG Algorithms Based on Hash Functions and Block Ciphers

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-27 14:06:54
705Cryptographic hash functions / Keccak / BLAKE / Advanced Encryption Standard / Crypt / Skein / Algorithm / SHA-2 / SHA-1 / Error detection and correction / NIST hash function competition / Cryptography

outbind://132-00000000C28D6AD45D681F4D837CF97C3377EF1B070066930

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-16 14:39:14
706Computer programming / Applied mathematics / Cryptographic hash functions / NIST hash function competition / Computing

outbind://90-00000000C28D6AD45D681F4D837CF97C3377EF1B0700D7A042

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-30 12:23:58
707Cryptographic hash functions / SHA-2

PDF Document

Add to Reading List

Source URL: bofdata.fire.ca.gov

Language: English - Date: 1997-07-26 01:00:00
708Information science / Information retrieval / Hash function / Locality-sensitive hashing / Hash table / Cryptographic hash function / Linear hashing / Tabulation hashing / Universal hashing / Search algorithms / Hashing / Artificial intelligence

Compact Hyperplane Hashing with Bilinear Functions Wei Liu† Jun Wang‡

Add to Reading List

Source URL: icml.cc

Language: English - Date: 2012-06-07 13:19:58
709Computing / Computer programming / Cryptographic hash functions / Software engineering / Business intelligence / SAS / Hash function / Hash table / Hash list / Search algorithms / Error detection and correction / Hashing

PharmaSUG[removed]Paper CC13 Creating a Clinical Summary Table within a Single DATA Step with the Dynamic Trio: DOSUBL(), Hash Objects, and ODS Objects Joseph Hinson, Princeton, NJ ABSTRACT

Add to Reading List

Source URL: www.pharmasug.org

Language: English - Date: 2013-05-05 15:33:41
710Computing / Search algorithms / Mathematics / Numbers / Error detection and correction / Hash function / Floating point / SHA-2 / Rounding / Hashing / Cryptographic hash functions / Computer arithmetic

A Fingerprint Method for Scientific Data Verification1 Version: [removed]Micah Altman Institute for Quantitative Social Science, Harvard University 1737 Cambridge St. # 325

Add to Reading List

Source URL: thedata.org

Language: English - Date: 2013-01-06 22:42:48
UPDATE