Hash

Results: 3740



#Item
371American cuisine / Fast food / French fries / Potatoes / Schnitzel

LUN C H PÅ GO DTH EM RÅRAKA MED KALIXLÖJROMg Kalixlöjrom med smetana, rödlök, gräslök och citron Swedish hash brown with bleak roe, smetana, onions and lemon STEAK TARTAR PETIT 169 (MAIN 275)

Add to Reading List

Source URL: pdfmeny.se

Language: Swedish - Date: 2016-07-05 12:59:38
372

Eve’s SHA3 candidate: malicious hashing Jean-Philippe Aumasson∗ Nagravision SA, Switzerland Abstract. We investigate the definition and construction of hash functions that incorporate a backdoor allowing their design

Add to Reading List

Source URL: 131002.net

Language: English - Date: 2012-08-14 06:46:39
    373

    Cryptanalysis of the ESSENCE Family of Hash Functions? Nicky Mouha1,2,?? , Gautham Sekar1,2,? ? ? , Jean-Philippe Aumasson3,† , Thomas Peyrin4 , Søren S. Thomsen5 , Meltem S¨onmez Turan6 , and Bart Preneel1,2 1 5

    Add to Reading List

    Source URL: 131002.net

    Language: English - Date: 2012-08-14 06:46:42
      374

      CRYPTANALYSIS OF A HASH FUNCTION BASED ON NORM FORM EQUATIONS JEAN-PHILIPPE AUMASSON Abstract. The cryptographic hash function Codefish is an outcome of a research project led by the company KRIPTO Research and the Unive

      Add to Reading List

      Source URL: 131002.net

      Language: English - Date: 2012-08-14 06:46:45
        375

        (Second) preimage attacks on Codefish Jean-Philippe Aumasson 1/1 Codefish hash function

        Add to Reading List

        Source URL: 131002.net

        - Date: 2012-08-14 06:47:11
          376

          ACFrOgBd-7vfLHSP4aGCzaEKgTFPa2MiCYvmcTl...&hash=l56jjp5p81h96gc523tus0s8fvco1lir

          Add to Reading List

          Source URL: www.nirs.org

          - Date: 2015-10-16 17:33:31
            377Cryptography / Argon2 / Lyra2 / BLAKE / Password Hashing Competition / Key derivation function / Hash function / Cryptographic hash function / Cryptographic nonce / Password / Salt / Scrypt

            Argon2 Designers: Alex Biryukov, Daniel Dinu, and Dmitry Khovratovich University of Luxembourg, Luxembourg , , https://www.cryptolux.org/index.php/Argo

            Add to Reading List

            Source URL: password-hashing.net

            Language: English - Date: 2015-07-22 02:06:59
            378Computer access control / Computer security / Cryptography / Computing / YubiKey / Pluggable authentication module / One-time password / Hash-based message authentication code / Authentication / LinOTP / HMAC-based One-time Password Algorithm

            YubiKey Mac OS X Login Using Yubico Pluggable Authentication Module (PAM) with Challenge-Response YubiKey Mac OS X Login

            Add to Reading List

            Source URL: www.yubico.com

            Language: English - Date: 2016-04-12 12:42:03
            379

            11.30am -5pm Weekends Duck Eggs Hashes Portobello Mushroom & Spinach HashSmoked Haddock Hash 13.25

            Add to Reading List

            Source URL: colonygrill.assets.d3r.com

            Language: English - Date: 2016-04-27 07:59:53
              380Computing / Concurrent computing / Computer architecture / Routing algorithms / Distributed data storage / Network architecture / File sharing / Routing protocols / Overlay network / Distributed hash table / Routing / Link-state routing protocol

              Practical Intrusion-Tolerant Networks Daniel Obenshain∗ , Thomas Tantillo∗ , Amy Babay, John Schultz, Andrew Newell, Md. Endadul Hoque, Yair Amir, and Cristina Nita-Rotaru Johns Hopkins University — {dano, tantillo

              Add to Reading List

              Source URL: www.cnds.jhu.edu

              Language: English - Date: 2016-04-28 20:17:25
              UPDATE