Hash

Results: 3740



#Item
201Cryptography / Biometrics / Coding theory / Fuzzy extractor / Private biometrics / Error detection and correction / Password / Public key fingerprint / Cyclic redundancy check / Cryptographic hash function / Matching / Key

Bipartite Biotokens: Definition, Implementation, and Analysis W.J. Scheirer2,1,† and T.E. Boult1,2,†,? 1 Univ. of Colorado at Colorado Springs, Colorado Springs, CO

Add to Reading List

Source URL: vast.uccs.edu

Language: English - Date: 2010-10-23 12:03:49
202Cryptography / Cryptography standards / Cryptographic software / Cryptographic hash functions / Hashing / Microsoft CryptoAPI / FIPS 140-2 / FIPS 140 / Hash-based message authentication code / Critical Security Parameter / Key Wrap / SHA-2

Hitachi Virtual Storage Platform (VSP) Encryption Board FIPSNon-Proprietary Cryptographic Module Security Policy Version: 4.0 Date: July 27, 2016

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-07-27 10:26:48
203Hashing / Computer programming / Information science / Information retrieval / Finite automata / Trie / Associative arrays / Radix tree / Hash tree / Search algorithms / Hash array mapped trie / Hamming weight

QP tries are smaller and faster than crit-bit trees Tony Finch University of Cambridge

Add to Reading List

Source URL: tinytocs.ece.utexas.edu

Language: English - Date: 2016-03-05 17:06:25
204Distributed data storage / Computing / Concurrent computing / Distributed computing / Kademlia / Distributed hash table / Peer-to-peer / BitTorrent / Bootstrapping node / Routing / Mainline DHT / Pastry

Peerchat: a Distributed, P2P Communication Network based on Kademlia Forrest Pieper Will Drevo Colin Taylor May 4th, 2014

Add to Reading List

Source URL: css.csail.mit.edu

Language: English - Date: 2014-12-08 14:33:02
205NIST hash function competition / SHA-3 / Power analysis / Institute for Applied Information Processing and Communications / Cryptography / Side-channel attack / Algorithm / Mathematics / Science and technology / Science

Parallel vs. Sequential Computations Do they Leak the Same? Advisor(s): Thomas Korak and Hannes Groß Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-11-30 11:00:03
206Food and drink / Meals / Breakfast / Scrambled eggs / Omelette / Gravy / Food Paradise / Man Finds Food

BRUNCH EGG SCRAMBLES OR OMELETS your choice between scramble or omelet (served with hash browns, “those potatoes” or fresh fruit & choice of toast)

Add to Reading List

Source URL: www.themarkpdx.com

Language: English - Date: 2016-01-14 15:36:59
207Hashing / Logger / Data logger / Data / Logfile / Hash-based message authentication code / Computer security / Information science / Information retrieval / Cryptography / Trusted computing / Trusted Platform Module

Continuous Tamper-proof Logging using TPM2.0 Paul England, Limin Jia, James Lorch, and Arunesh Sinha July 9, 2013 (Revised June 16, 2014)

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2016-01-24 20:37:43
208Cryptography / Cryptographic hash functions / Information retrieval / Search algorithms / Hashing / Permutations / Error detection and correction / Hash function / Advantage / Birthday attack / Parity of a permutation / One-way compression function

An earlier version of this paper appeared in EurocryptSecurity/Efficiency Tradeoffs for Permutation-Based Hashing Phillip Rogaway1 and John Steinberger2 1

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2008-05-26 20:18:15
209Software / Computing / Data management / Database / R-tree / Extensible Storage Engine / Relational database management systems / File sharing / Distributed hash table / Book:Non-Relational Databases

Distributed, Concurrent Range Monitoring of Spatial-Network Constrained Mobile Objects Hua Lu1,2 , Zhiyong Huang1,3, Christian S. Jensen2 , and Linhao Xu1 1 School of Computing, National University of Singapore, Singapo

Add to Reading List

Source URL: people.cs.aau.dk

Language: English - Date: 2007-05-23 09:13:00
210Distributed data storage / Computing / Computer programming / Software engineering / Distributed hash table / Tapestry / Chord / Consistent hashing / Pastry / Linked list / Node / Trie

Glacier: Highly durable, decentralized storage despite massive correlated failures∗ Andreas Haeberlen Alan Mislove

Add to Reading List

Source URL: www.cs.rice.edu

Language: English - Date: 2005-05-09 16:29:39
UPDATE