Hash tree

Results: 206



#Item
161Peer-to-peer computing / Cryptography / Transaction processing / Proof-of-work system / Currency / Peer-to-peer / Coin / Hash tree / United States dollar / Software / Computing / Bitcoin

An Efficient Distributed Currency Ben Laurie ([removed]) Sat Jul 23 15:48:[removed] +[removed]:b107be5bc87e) 1

Add to Reading List

Source URL: www.links.org

Language: English - Date: 2011-07-23 10:49:24
162Computing / Information / Data / Oram / CPU cache / Hash list / Hash tree / Hash function / Trie / Hashing / Error detection and correction / Cryptographic hash functions

1 Integrity Verification for Path Oblivious-RAM Ling Ren, Christopher W. Fletcher , Xiangyao Yu, Marten van Dijk and Srinivas Devadas MIT CSAIL, Cambridge, MA, USA {renling, cwfletch, yxy, marten, devadas}@mit.edu

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2013-08-04 20:04:19
163Statistics / Data mining / Machine learning / Linear algebra / Nearest neighbor search / Space / Cluster analysis / Metric tree / Hash function / Mathematics / Information science / Search algorithms

A Hashed Schema for Similarity Search in Metric Spaces Claudio Gennaro Pasquale Savino

Add to Reading List

Source URL: www.ercim.eu

Language: English - Date: 2008-12-08 05:11:33
164Cryptography / NIST hash function competition / Keccak / SHA-2 / SHA-1 / Crypt / Hash function / HMAC / Hash tree / Cryptographic hash functions / Error detection and correction / Hashing

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-09-26 15:45:01
165Hashing / Error detection and correction / Public key certificate / Certificate authority / Hash tree / Cryptographic hash function / Extensible Storage Engine / Digital signature / Hash function / Cryptography / Public-key cryptography / Key management

Certificate Transparency v2.1a Ben Laurie ([removed]) Emilia Kasper ([removed]) Introduction

Add to Reading List

Source URL: www.links.org

Language: English - Date: 2012-09-07 08:18:37
166Hashing / Error detection and correction / Public key certificate / Cryptographic hash function / Digital signature / Certificate authority / Hash tree / Extensible Storage Engine / Venti / Cryptography / Public-key cryptography / Key management

Certificate Transparency v2 Introduction The goal is to make it impossible (or at least very difficult) for a Certificate Authority to issue a certificate for a domain without it being visible to the owner of that domain

Add to Reading List

Source URL: sump2.links.org

Language: English - Date: 2012-07-31 18:43:33
167Search algorithms / Hashing / Trie / Hash tree / Hash function / Revocation list / Merkle signature scheme / Cryptography / Error detection and correction / Binary trees

Revocation Transparency Ben Laurie ([removed]) Emilia Kasper ([removed]) Introduction Like Certificate Transparency, only for revocation. Unlike CT, RT needs a recent status for the

Add to Reading List

Source URL: sump2.links.org

Language: English - Date: 2012-09-11 10:55:10
168Hashing / Computing / NIST hash function competition / Skein / Threefish / Hash tree / Hash function / B-tree / SHA-2 / Error detection and correction / Cryptography / Cryptographic hash functions

parSkein-tm-final_eprint.dvi

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-10-02 04:40:32
169Concurrent computing / Distributed hash table / Kademlia / Chord / Peer-to-peer / Hash table / Nearest neighbor search / Prefix hash tree / Search engine indexing / Distributed data storage / Information science / Computing

Fast Similarity Search in Peer-to-Peer Networks Thomas Bocek1, Ela Hunt2, David Hausheer1, Burkhard Stiller1,3 Communication Systems Group, Department of Informatics IFI, University of Zurich, Switzerland 2Department of

Add to Reading List

Source URL: fastss.csg.uzh.ch

Language: English - Date: 2008-01-22 07:04:30
UPDATE