Hash

Results: 3740



#Item
111Search algorithms / Information science / Information retrieval / Hashing / Error detection and correction / Hash function / Hash table / BLAST / Locality-sensitive hashing / Bloom filter

CSE 584A Class 24 Jeremy Buhler April 20, 2016 1

Add to Reading List

Source URL: classes.engineering.wustl.edu

Language: English - Date: 2016-04-22 15:32:46
112Cryptography / Cryptocurrencies / Alternative currencies / Public-key cryptography / Digital currencies / CryptoNote / Ring signature / Digital signature / Hash function / Communications protocol / Monero

Aggregate Addresses in CryptoNote: Towards Efficient Privacy Bytecoin Team September 8, Introduction

Add to Reading List

Source URL: bytecoin.org

Language: English - Date: 2015-09-08 14:06:44
113Cryptography / Public-key cryptography / IP / Undeniable signature / Digital signature / Challengeresponse authentication / David Chaum / Cryptographic hash function / RSA

l l l Il l l l| | l| l l l l l?gl lug gl lul l l l l l l l l l l l l l United States PatentPatent Number:

Add to Reading List

Source URL: www.chaum.com

Language: English - Date: 2015-05-26 20:08:31
114Distributed data storage / Concurrent computing / Distributed computing / Computing / Distributed hash table / Consensus / Chord / Kademlia

PeerReview: Practical Accountability for Distributed Systems Andreas Haeberlen†‡ , Petr Kuznetsov† , and Peter Druschel† † Max Planck Institute for Software Systems, ‡ Rice University

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2009-10-16 16:58:50
115Cryptocurrencies / Cryptography / Computing / E-commerce / Blockchain / Ethereum / Secure multi-party computation / Secret sharing / Smart contract / Bitcoin / Distributed hash table / Shadow

Enigma: Decentralized Computation Platform with Guaranteed Privacy Guy Zyskind Oz Nathan

Add to Reading List

Source URL: web.media.mit.edu

Language: English - Date: 2015-06-27 14:46:30
116Computing / GIS file formats / United States Geological Survey / Computer architecture / Cartography / Digital line graph / Extract /  transform /  load / Geographic information system / Cell / USGS DEM / Hash function / Tar

FORMATTING GEOGRAPHIC DATA TO ENHANCE MANIPULABILITY Gail Langran Mapping, Charting, and Geodesy Division Naval Ocean Research and Development Activity NSTL, Mississippi 39529

Add to Reading List

Source URL: mapcontext.com

Language: English - Date: 2008-08-30 00:26:19
117File sharing networks / Computing / Software / File sharing / EDonkey network / Kad network / EMule / Peer-to-peer / Gnutella / Distributed hash table / Kademlia / BitTorrent

A Peer Activity Study in eDonkey & Kad Thomas Locher1 , David Mysicka1 , Stefan Schmid2 , Roger Wattenhofer1 1 Computer Engineering and Networks Laboratory (TIK), ETH Zurich, CH-8092 Zurich, Switzerland. {.

Add to Reading List

Source URL: www.tik.ee.ethz.ch

Language: English - Date: 2015-05-18 12:16:16
118Cryptography / Cryptographic hash functions / Hashing / Applied mathematics / Cryptocurrencies / Public-key cryptography / Cryptographic nonce / SHA-2 / Bitcoin / Crypt / Hash function / Padding

The Politics of Cryptography: Bitcoin and The Ordering Machines

Add to Reading List

Source URL: www.iqdupont.com

Language: English - Date: 2015-12-03 10:50:31
119Information retrieval / Information science / Hashing / Search algorithms / Universal hashing / Hash table / Linear probing / Hash function / Bloom filter / Cuckoo hashing / Randomness extractor / Cryptographic hash function

Why Simple Hash Functions Work: Exploiting the Entropy in a Data Stream∗ Michael Mitzenmacher† Salil Vadhan‡ School of Engineering & Applied Sciences Harvard University

Add to Reading List

Source URL: www.eecs.harvard.edu

Language: English - Date: 2007-11-16 13:42:30
120Cryptography / Encodings / X.690 / Computing / Information / Abstract Syntax Notation One / PKCS 1 / Padding / Hash function / Octet / Cryptographic hash function / RSA

ASN.1 parsing in crypto libraries: what could go wrong? Andrew Furtak, Yuriy Bulygin, Alex Bazhaniuk Advanced Threat Research

Add to Reading List

Source URL: www.intelsecurity.com

Language: English - Date: 2016-05-02 12:28:32
UPDATE