Hash functions

Results: 1148



#Item
911Drug addiction / SHA-2 / SHA-1 / NHS strategic health authority / Alcoholism / Ethics / Cryptographic hash functions / Psychiatry / Alcohol abuse

Norman Lamb: To ask the Secretary of State for Health how many children were born to drug-dependent mothers in each of the last five years, broken down by (a) region and (b) type of drug[removed]Apr 2008 : Column 12

Add to Reading List

Source URL: www.foinews.co.uk

Language: English - Date: 2012-12-12 04:01:35
912MD5 / Merkle–Damgård construction / SHA-1 / Collision resistance / Collision / One-way compression function / Fast Syndrome Based Hash / Cryptographic hash functions / Cryptography / Hash function

CS255: Cryptography and Computer Security Winter 2010

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2010-02-10 16:51:29
913Hashing / RSA / Hash function / Collision resistance / CBC-MAC / Hash chain / One-way compression function / Lamport signature / Cryptography / Cryptographic hash functions / Search algorithms

CS255: Cryptography and Computer Security Winter 2007

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2008-03-10 18:06:00
914Hashing / Hash / Party / Information retrieval / Artificial intelligence / Information science / Error detection and correction / Cryptographic hash functions / Search algorithms

OCH3 Annual Summer Party 26th and 27th July 2013 at The Pheasantry, Merrywood Grove, Tadworth Surrey, KT20 7HF

Add to Reading List

Source URL: www.och3.org.uk

Language: English - Date: 2014-04-14 14:30:36
915Search algorithms / Computing / Information retrieval / Artificial intelligence / Cryptography / Hash function / Online codes / Hash list / Hash tree / Cryptographic hash functions / Error detection and correction / Hashing

On-the-Fly Verification of Rateless Erasure Codes for Efficient Content Distribution Maxwell N. Krohn Michael J. Freedman

Add to Reading List

Source URL: www.coralcdn.org

Language: English - Date: 2004-03-19 09:39:34
916SHA-1 / MD5 / Search algorithms / Collision attack / Wang Xiaoyun / Hash function / Collision / Padding / Money supply / Cryptography / Cryptographic hash functions / Hashing

Collision Search Attacks on SHA1 Xiaoyun Wang∗

Add to Reading List

Source URL: www.c4i.org

Language: English - Date: 2006-12-02 03:56:23
917Advanced Encryption Standard / Message authentication codes / Hashing / SecurID / ICE / VEST / Hash function / Lookup table / Hamming weight / Cryptography / Cryptographic hash functions / Stream ciphers

Fast Software-Based Attacks on SecurID Scott Contini1 and Yiqun Lisa Yin2 1 Macquarie University, Computing Department, NSW 2109 Australia, [removed],

Add to Reading List

Source URL: www.crypto-world.com

Language: English - Date: 2011-04-01 07:21:08
918Cryptographic hash functions / Hash House Harriers / Hash function / Hash list / Hash / Information retrieval / Artificial intelligence / Human behavior / Error detection and correction / Hashing / Search algorithms

Singapore Hash House Harriets 2000th Run 22nd October 2011 The Grand Mattress... Dear Hashers,

Add to Reading List

Source URL: www.singaporeharriets.com

Language: English - Date: 2011-10-31 01:54:49
919Information science / Information retrieval / Cryptographic hash functions / Information / Hash function / Record linkage / Health informatics / National Institute of Environmental Health Sciences / Hash list / Hashing / Error detection and correction / Search algorithms

Anonymous Record Linkage Between EPR and CDW-H: Toward Development of a Federated Genotype-Phenotype System Dongqiuye Pu, M.S.1,2, Stavros Garantziotis, M.D.3, Javed Mostafa, Ph.D.1,2

Add to Reading List

Source URL: www.ncbi.nlm.nih.gov

Language: English
920Search algorithms / Preimage attack / Error detection and correction / Universal one-way hash function / Collision resistance / HMAC / Hash function / One-way compression function / Lamport signature / Cryptography / Cryptographic hash functions / Hashing

Cryptographic Hash Workshop[removed]Design Principles for Hsh Functions Revisited

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 10:12:02
UPDATE