Hash

Results: 3740



#Item
281Cryptography standards / Cryptographic hash functions / Cryptographic software / Hashing / Block cipher mode of operation / SHA-2 / Advanced Encryption Standard / Hash-based message authentication code / FIPS 140-2 / Key Wrap / SHA-1 / Cryptographic Module Validation Program

Microsoft Word - TID1SUB-HPE_Data_SV1_140sp2686.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-07-29 15:19:10
282Identity theft / Security hacker / Exploit / Hacking

Hacking Sucks! Why hash makes the hurting stop the grugq <> Agenda Why Hacking Sucks

Add to Reading List

Source URL: grugq.github.io

Language: English - Date: 2015-01-27 19:51:39
283Cryptography / Cryptographic hash functions / Preimage attack / Advantage / Permutation / Random oracle / Birthday attack

Constructing Cryptographic Hash Functions from Fixed-Key Blockciphers Phillip Rogaway1 and John Steinberger2 1 2

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2008-07-20 11:55:06
284Search algorithms / Trie / HAT-trie / Hash table / Hash function / Set / Search tree / Radix tree / Radix sort

Under consideration for publication in J. Functional Programming 1 A Functional Toolkit for Morphological and Phonological Processing,

Add to Reading List

Source URL: gallium.inria.fr

Language: English - Date: 2004-04-19 09:40:02
285Search algorithms / Hashing / Cache / Arrays / Hash table / Hash join / Hash function / CPU cache / Query optimization / Trie / Join / Database

Forecasting the cost of processing multi-join queries via hashing for main-memory databases

Add to Reading List

Source URL: web.cse.ohio-state.edu

Language: English - Date: 2015-08-14 19:41:23
286Hash functions / Hashing / Measure theory / Statistical distance / Data mining / MinHash / Jaccard index / Cluster analysis / Similarity measure / California Codes / C

The Migration of the Field Code Kellen Funk and Lincoln Mullen This paper describes our work in progress for the Digital Humanities Working Group at George Mason University on February 17, 2016. E-mail: lincoln@lincolnmu

Add to Reading List

Source URL: lmullen.github.io

Language: English - Date: 2016-08-13 18:01:55
287NIST hash function competition / SHA-3 / Cryptographic hash functions / Sponge function / Gilles Van Assche / Joan Daemen / Data Encryption Standard / Permutation / Differential cryptanalysis

Keccak sponge function family main document Guido Bertoni1 Joan Daemen1 Micha¨el Peeters2

Add to Reading List

Source URL: keccak.noekeon.org

Language: English - Date: 2013-02-27 15:26:40
288British cuisine / Breakfast / Meals / Scrambled eggs / English muffin / Omelette / Hash / Full breakfast / Fried egg

PDF Document

Add to Reading List

Source URL: www.clubcorp.com

Language: English
289Search algorithms / Hashing / Selection algorithm / Hash function / Randomized algorithm / A* search algorithm / Cryptographic hash function

Distributed Computation of the Mode Fabian Kuhn Institute of Theoretical Computer Science ETH Zurich

Add to Reading List

Source URL: www.tik.ee.ethz.ch

Language: English - Date: 2015-05-18 12:16:08
290Intellectual property law / File sharing / Distributed data storage / Peer-to-peer / Cross-platform software / Social peer-to-peer processes / Freenet / JXTA / Internet / Clientserver model / Distributed hash table

Napster Gnutella Freenet The first and most important conference on P2P

Add to Reading List

Source URL: conferences.oreillynet.com

Language: English - Date: 2014-01-16 14:38:17
UPDATE