Hash

Results: 3740



#Item
11An abridged version of this paper appears in Advances in Cryptology – Crypto 96 Proceedings, Lecture Notes in Computer Science Vol. 1109, N. Koblitz ed., Springer-Verlag, 1996. Keying Hash Functions for Message Authent

An abridged version of this paper appears in Advances in Cryptology – Crypto 96 Proceedings, Lecture Notes in Computer Science Vol. 1109, N. Koblitz ed., Springer-Verlag, 1996. Keying Hash Functions for Message Authent

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2006-02-10 14:35:40
12Improved Generic Attacks Against Hash-based MACs and HAIFA? Itai Dinur1 and Ga¨etan Leurent2 1  ´

Improved Generic Attacks Against Hash-based MACs and HAIFA? Itai Dinur1 and Ga¨etan Leurent2 1 ´

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:35
13The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function Jian Guo1 , J´er´emy Jean1 , Ga¨etan Leurent2 , Thomas Peyrin1 , and Lei Wang1 1

The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function Jian Guo1 , J´er´emy Jean1 , Ga¨etan Leurent2 , Thomas Peyrin1 , and Lei Wang1 1

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:34
141  Analytic Queries over Geospatial Time-Series Data using Distributed Hash Tables Matthew Malensek, Sangmi Pallickara, and Shrideep Pallickara, Members, IEEE Abstract—As remote sensing equipment and networked observat

1 Analytic Queries over Geospatial Time-Series Data using Distributed Hash Tables Matthew Malensek, Sangmi Pallickara, and Shrideep Pallickara, Members, IEEE Abstract—As remote sensing equipment and networked observat

Add to Reading List

Source URL: galileo.cs.colostate.edu

Language: English - Date: 2016-01-16 12:05:26
    15Web Scale Photo Hash Clustering on A Single Machine Yunchao Gong, Marcin Pawlowski, Fei Yang, Louis Brandy, Lubomir Boundev, Rob Fergus Facebook Abstract  1010010101001001001#

    Web Scale Photo Hash Clustering on A Single Machine Yunchao Gong, Marcin Pawlowski, Fei Yang, Louis Brandy, Lubomir Boundev, Rob Fergus Facebook Abstract 1010010101001001001#

    Add to Reading List

    Source URL: openaccess.thecvf.com

    Language: English - Date: 2017-04-03 20:02:31
      16ECRYPT Hash Workshop 2011

      ECRYPT Hash Workshop 2011

      Add to Reading List

      Source URL: fse2011.mat.dtu.dk

      - Date: 2010-12-07 05:46:54
        17Exercise	
   •  Implement	
  a	
  set	
  (add,	
  remove,	
  contains)	
  using	
   the	
  fine-­‐grained	
  locking	
  technique.	
  Hash	
  code	
   should	
  not	
  be	
  assumed	
  to	
  be

        Exercise   •  Implement  a  set  (add,  remove,  contains)  using   the  fine-­‐grained  locking  technique.  Hash  code   should  not  be  assumed  to  be

        Add to Reading List

        Source URL: fileadmin.cs.lth.se

        - Date: 2013-12-05 15:22:27
          18W-OTS+ – Shorter Signatures for Hash-Based Signature Schemes Andreas H¨ ulsing?  Cryptography and Computeralgebra

          W-OTS+ – Shorter Signatures for Hash-Based Signature Schemes Andreas H¨ ulsing? Cryptography and Computeralgebra

          Add to Reading List

          Source URL: huelsing.files.wordpress.com

          Language: English - Date: 2013-05-21 05:30:06
            19Hash-based Signatures in Practice Starting the transition to post-quantum cryptography Stefan-Lukas Gazdag PQCrypto –

            Hash-based Signatures in Practice Starting the transition to post-quantum cryptography Stefan-Lukas Gazdag PQCrypto –

            Add to Reading List

            Source URL: 2017.pqcrypto.org

            Language: English - Date: 2017-06-27 05:20:35
              20Introduc on  Hash-based signatures Gra ing trees

              Introduc on Hash-based signatures Gra ing trees

              Add to Reading List

              Source URL: www.math.fau.edu

              Language: English - Date: 2018-04-24 10:36:01