Hash list

Results: 236



#Item
41Cryptographic hash functions / Search algorithms / Computing / MD5 / Computer programming / Bloom filter / Hash function / Hash list / Hashing / Error detection and correction / Cryptography

Presenter Paper Structure

Add to Reading List

Source URL: www.dfrws.org

Language: English - Date: 2015-03-29 01:12:36
42Hashing / Message authentication codes / Search algorithms / Hash function / SHA-2 / Crypt / SHA-1 / Hash list / Hash tree / Cryptographic hash functions / Error detection and correction / Cryptography

Lecture 15: Hashing for Message Authentication Lecture Notes on “Computer and Network Security” by Avi Kak () April 30, 2015 3:29pm

Add to Reading List

Source URL: engineering.purdue.edu

Language: English - Date: 2015-04-30 15:30:26
43Hash function / Computing / Hashing / Information retrieval / Artificial intelligence / List / Hash list / ZPAQ / Hash table / Error detection and correction / Search algorithms / Cryptographic hash functions

Microsoft Word - How WCopyfind and Copyfind work.docx

Add to Reading List

Source URL: plagiarism.bloomfieldmedia.com

Language: English - Date: 2011-11-02 09:10:39
44SHA-1 / RIPEMD / Hash function / Crypt / Hash list / MD4 / MD5 / Cryptographic hash functions / Cryptography / SHA-2

Japan Cryptographic Module Validation Program(JCMVP) Specifications of Cryptographic Algorithm Implementation Testing — Hash Functions —

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-05-28 08:15:33
45Skip graph / Distributed hash table / Skip list / Connectivity / Linked list / Node / Chord / Bin / Koorde / Distributed data storage / Computing / Computer programming

CCCG 2011, Toronto ON, August 10–12, 2011 Orthogonal Range Search using a Distributed Computing Model Pouya Bisadi∗ Abstract

Add to Reading List

Source URL: 2011.cccg.ca

Language: English - Date: 2011-08-06 04:11:12
46Search algorithms / Hash House Harriers / Hash function / Hash list / Hash / Human behavior / Information retrieval / Artificial intelligence / Error detection and correction / Cryptographic hash functions / Hashing

MOUNT VERNON HASH HOUSE HARRIERS 2015 ANNUAL GENERAL MEETING (AGM) When: Friday 17 April 2015 to Sunday 19 Aprilnights) Where: Dewey Beach, DE Hash hotel: Atlantic Oceanside Motel, 1700 Coastal Hwy, Dewey Beach,

Add to Reading List

Source URL: www.dchashing.org

Language: English - Date: 2014-12-26 18:09:44
47Information science / Artificial intelligence / Tabulation hashing / Hash function / Linear probing / Cuckoo hashing / Cryptographic hash function / Hash list / Universal hashing / Hashing / Search algorithms / Information retrieval

May 2013 MADALGO seminar by Mikkel Thorup, University of Copenhagen The Power of Tabulation Hashing Abstract: Abstract Randomized algorithms are often enjoyed for their simplicity, but the hash functions used to yield

Add to Reading List

Source URL: old-madalgo.au.dk

Language: English - Date: 2013-05-10 08:51:10
48Error detection and correction / Search algorithms / Hash function / MD5 / Collision / SHA-1 / Hash list / Claw-free permutation / Collision attack / Cryptographic hash functions / Cryptography / Hashing

Secure Names for Bit-Strings Stuart Haber* W. Scott Stornetta*

Add to Reading List

Source URL: nakamotoinstitute.org

Language: English - Date: 2014-03-23 11:44:47
49Software engineering / Hashing / Abstract data types / Data types / Hash table / Hash function / Set / List / Append / Search algorithms / Computing / Computer programming

CS109A Notes for LectureRepresenting Sets 1. List. Simple, O(n) dictionary operations. 2. Binary Search Tree. O(log n) average dictionary operations. Supports other operations like range queries, sorting. 3. Char

Add to Reading List

Source URL: infolab.stanford.edu

Language: English - Date: 2008-09-19 00:58:20
50Information science / Artificial intelligence / Hash table / Cuckoo hashing / Universal hashing / Hash function / Dynamic perfect hashing / Double hashing / Perfect hash function / Search algorithms / Hashing / Information retrieval

Previously on COMS31900. . . Advanced Algorithms – COMS31900 Hashing with chaining Instead of a linked list, throw colliding

Add to Reading List

Source URL: www.cs.bris.ac.uk

Language: English - Date: 2014-03-11 09:18:18
UPDATE