Hash

Results: 3740



#Item
31

Legal Risk Statement This BHP project white paper is for reference only and may not rely on the statements in this article as a basis for making an investment decision. Bank of Hash Power Group does not make any represen

Add to Reading List

Source URL: bhpcash.io

Language: English - Date: 2018-07-03 05:12:08
    32

    F. Kordon - Sorbonne Université - CC2018 Building and verifying a Logging entity over Distributed Hash Tables Join work with X. Bonnaire, R. Cortes & O. Marin

    Add to Reading List

    Source URL: www-desir.lip6.fr

    Language: English - Date: 2018-01-26 04:13:32
      33

      Cryptographic Hash Functions Part I Cryptography 1 Andreas Hülsing, TU/e Based on slides by Sebastiaan de Hoogh, TU/e

      Add to Reading List

      Source URL: www.hyperelliptic.org

      Language: English - Date: 2016-09-29 20:50:51
        34

        Implementation and Benchmarking of Perceptual Image Hash Functions Christoph Zauner DIPLOMARBEIT

        Add to Reading List

        Source URL: www.phash.org

        Language: English - Date: 2010-07-20 12:14:14
          35

          1 Geometry and Proximity Constrained Query Evaluations over Large Geospatial Datasets Using Distributed Hash Tables Matthew Malensek, Sangmi Pallickara, and Shrideep Pallickara, Members, IEEE

          Add to Reading List

          Source URL: galileo.cs.colostate.edu

          Language: English - Date: 2014-03-28 11:45:58
            36

            SHAttered The first concrete collision attack against SHA-1 https://shattered.io A collision is when two different documents have the same hash fingerprint

            Add to Reading List

            Source URL: shattered.io

            - Date: 2017-02-21 16:44:42
              37

              Comments Received in Response to: Request for Comments on Draft FIPS 202, SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions

              Add to Reading List

              Source URL: csrc.nist.gov

              - Date: 2017-02-24 15:05:30
                38

                SHAttered The first concrete collision attack against SHA-1 https://shattered.io A collision is when two different documents have the same hash fingerprint

                Add to Reading List

                Source URL: shattered.it

                - Date: 2017-02-21 16:44:42
                  39

                  (ARCHIVED as of AUGUST 5, 2015): DRAFT FIPS 202, SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions

                  Add to Reading List

                  Source URL: csrc.nist.gov

                  - Date: 2017-03-01 15:35:52
                    40

                    New Second Preimage Attacks on Dithered Hash Functions with Low Memory Complexity Muhammad Barham1,? , Orr Dunkelman1,? , Stefan Lucks2 , and Marc Stevens3 1

                    Add to Reading List

                    Source URL: marc-stevens.nl

                    - Date: 2017-08-13 07:48:58
                      UPDATE