Hash list

Results: 236



#Item
131Error detection and correction / Search algorithms / Hash function / Merkle–Damgård construction / Preimage attack / Hash list / Provably secure cryptographic hash function / One-way compression function / Cryptographic hash functions / Cryptography / Hashing

Desiderata for Future Hash Functions?

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:07:38
132Cryptography / Collision resistance / Hash function / Hash list / SHA-2 / Collision / Universal one-way hash function / SHA-1 / Provably secure cryptographic hash function / Cryptographic hash functions / Error detection and correction / Hashing

Classification of Hash Functions Suitable for Real-life Systems

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:53:32
133Error detection and correction / SHA-2 / SHA-1 / MD5 / Digital signature / Hash list / Hash function / Trusted timestamping / Linked timestamping / Cryptography / Cryptographic hash functions / Hashing

Long-lived digital integrity using short-lived hash functions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:39:50
134Cryptographic hash functions / Concrete / Highways / Road / SHA-2 / Asphalt concrete / Transport / Land transport / Road transport

CTC Financial Vote List 2.5 June 25, 2014 Highway Financial Matters

Add to Reading List

Source URL: www.catc.ca.gov

Language: English - Date: 2014-08-07 19:33:47
135Cryptographic hash functions / Search algorithms / Collision resistance / Hash function / Hash list / Advanced Encryption Standard / Cryptography / Hashing / Error detection and correction

Hash Workshop Wrapup Agreement • Don’t really know what we are doing – AES competition was a learning experience – Big safety margin

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:04:50
136French fries / Street food / World cuisine / American cuisine / Lamb and mutton / Crinkle-cutting / Hash browns / FY / Wa /  Ghana / Food and drink / Belgian cuisine / Fast food

FOODSERVICE PRODUCT LIST Supersedes none. Any price quote subject to final confirmation and change without notice. #ZGTF-CANADA - JANUARY 2007

Add to Reading List

Source URL: www.lambweston.ca

Language: English - Date: 2013-08-19 09:16:09
137Cryptographic hash functions / SHA-2 / Kentucky Route 9 / CTC / Road surface / Highway / Transport / Road transport / Land transport

CTC PROJECT ALLOCATION LIST – MAY 2014 Project # Allocation Amount Recipient RTPA/CTC County

Add to Reading List

Source URL: www.caltrans.ca.gov

Language: English - Date: 2014-05-22 13:27:43
138Error detection and correction / Cryptography / Information retrieval / Computing / Hash function / Hash table / Associative array / Hash list / Comparison of programming languages / Hashing / Search algorithms / Cryptographic hash functions

Package ‘hash’ July 2, 2014 Type Package Title Full feature implementation of hash/associated arrays/dictionaries Version[removed]Date[removed]

Add to Reading List

Source URL: cran.r-project.org

Language: English - Date: 2014-07-02 12:06:36
139Software / Rsync / Computer file formats / NetCDF / Checksum / Cksum / Transmission Control Protocol / Hash list / Cwrsync / Computing / System software / Data synchronization

16.3 NETWORKED SYNCHRONIZATION OF NETCDF DATASETS 1 2

Add to Reading List

Source URL: ams.confex.com

Language: English - Date: 2004-11-06 13:24:33
140Error detection and correction / Search algorithms / Hash function / Hash tree / Hash list / SHA-1 / SHA-2 / Trie / Hash chain / Cryptographic hash functions / Cryptography / Hashing

Efficient Record-Level Keyless Signatures for Audit Logs Ahto Buldas1 , Ahto Truu1 , Risto Laanoja1 , and Rainer Gerhards2 1 Guardtime AS, Tallinn, Estonia {ahto.buldas,ahto.truu,risto.laanoja}@guardtime.com

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-07-15 10:18:50
UPDATE