Hash functions

Results: 1148



#Item
841Error detection and correction / Hashing / Information / National Software Reference Library / Computing / Fingerprint / Nationalsozialistischer Reichsbund für Leibesübungen / SHA-1 / Hash list / Cryptographic hash functions / National Institute of Standards and Technology / United States Department of Commerce

Report to U.S. Election Assistance Commission July 13, 2004 The National Institute of Standards and Technology (NIST) has run the National Software Reference Library (NSRL) project since[removed]The NSRL provides the means

Add to Reading List

Source URL: www.nsrl.nist.gov

Language: English - Date: 2004-07-14 08:34:40
842Sha / Computing / Cryptographic hash functions / SHA-2 / SHA-1

Release Notes: DTrade v.3.0 November 22, 2013 Contents This document provides specific information for the release of DTrade v.3.0.

Add to Reading List

Source URL: www.pmddtc.state.gov

Language: English - Date: 2013-11-21 16:15:48
843Hashing / Computing / NIST hash function competition / Skein / Threefish / Hash tree / Hash function / B-tree / SHA-2 / Error detection and correction / Cryptography / Cryptographic hash functions

parSkein-tm-final_eprint.dvi

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-10-02 04:40:32
844Hash function / Hash list / Hash / Information retrieval / Artificial intelligence / Computing / Error detection and correction / Hashing / Cryptographic hash functions

PDF Document

Add to Reading List

Source URL: firejune.com

Language: English - Date: 2014-07-18 16:19:14
845Cultural history / Cryptographic hash functions / Hashing / Search algorithms / Hash House Harriers / Three hares / Hua Hin District / Hash function / Hare / Visual arts / Error detection and correction / Culture

VISITORS ARE VERY WELCOME RUN # [removed]JUNE 2014 PUBLISHED BY THE JOSEPH GOEBBLES SCHOOL OF PROPAGANDA

Add to Reading List

Source URL: www.pattayajungle.com

Language: English - Date: 2014-06-05 22:22:40
846Search algorithms / Recreation / Hash House Harriers / Hash function / Hua Hin District / Hash list / Pattaya / Hash / Hare / Error detection and correction / Cryptographic hash functions / Hashing

VISITORS ARE VERY WELCOME RUN # [removed]APRIL 2014 PUBLISHED BY THE JOSEPH GOEBBLES SCHOOL OF PROPAGANDA

Add to Reading List

Source URL: www.pattayajungle.com

Language: English - Date: 2014-04-26 20:32:40
847Recreation / Hashing / Hash House Harriers / Interhash / Hash function / Human behavior / Hash list / Hare / Hash / Error detection and correction / Cryptographic hash functions / Search algorithms

VISITORS ARE VERY WELCOME RUN # [removed]FEB 2014 PUBLISHED BY THE JOSEPH GOEBBLES SCHOOL OF PROPAGANDA

Add to Reading List

Source URL: www.pattayajungle.com

Language: English - Date: 2014-02-03 19:21:11
848Cryptographic hash functions / Hash function / Hash list / Hash / Gluten-free diet / Information retrieval / Artificial intelligence / Computing / Error detection and correction / Hashing / Search algorithms

Microsoft Word - WH4Campout2014_rego

Add to Reading List

Source URL: www.whitehousehash.com

Language: English - Date: 2014-03-31 15:42:29
849NESSIE / Outline of cryptography / CRYPTREC / Cryptography / Cryptography standards / Cryptographic hash functions

FOR IMMEDIATE RELEASE February 27, 2003 Bart Preneel [removed]

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English - Date: 2003-02-22 16:57:52
850Fowler–Noll–Vo hash function / Mathematics / Landon Curt Noll / Cryptographic hash function / Hash functions / Cryptography / Error detection and correction

Generating Locally Unique point-2-point N_Port_IDs The Caffè Corretto version Landon Curt Noll T11/10-137v1

Add to Reading List

Source URL: www.t11.org

Language: English - Date: 2010-06-09 12:24:02
UPDATE