Hash

Results: 3740



#Item
31Legal Risk Statement This BHP project white paper is for reference only and may not rely on the statements in this article as a basis for making an investment decision. Bank of Hash Power Group does not make any represen

Legal Risk Statement This BHP project white paper is for reference only and may not rely on the statements in this article as a basis for making an investment decision. Bank of Hash Power Group does not make any represen

Add to Reading List

Source URL: bhpcash.io

Language: English - Date: 2018-07-03 05:12:08
    32F. Kordon - Sorbonne Université - CC2018  Building and verifying a Logging entity over Distributed Hash Tables Join work with X. Bonnaire, R. Cortes & O. Marin

    F. Kordon - Sorbonne Université - CC2018 Building and verifying a Logging entity over Distributed Hash Tables Join work with X. Bonnaire, R. Cortes & O. Marin

    Add to Reading List

    Source URL: www-desir.lip6.fr

    Language: English - Date: 2018-01-26 04:13:32
      33Cryptographic Hash Functions Part I Cryptography 1 Andreas Hülsing, TU/e Based on slides by Sebastiaan de Hoogh, TU/e

      Cryptographic Hash Functions Part I Cryptography 1 Andreas Hülsing, TU/e Based on slides by Sebastiaan de Hoogh, TU/e

      Add to Reading List

      Source URL: www.hyperelliptic.org

      Language: English - Date: 2016-09-29 20:50:51
        34Implementation and Benchmarking of Perceptual Image Hash Functions Christoph Zauner  DIPLOMARBEIT

        Implementation and Benchmarking of Perceptual Image Hash Functions Christoph Zauner DIPLOMARBEIT

        Add to Reading List

        Source URL: www.phash.org

        Language: English - Date: 2010-07-20 12:14:14
          351  Geometry and Proximity Constrained Query Evaluations over Large Geospatial Datasets Using Distributed Hash Tables Matthew Malensek, Sangmi Pallickara, and Shrideep Pallickara, Members, IEEE

          1 Geometry and Proximity Constrained Query Evaluations over Large Geospatial Datasets Using Distributed Hash Tables Matthew Malensek, Sangmi Pallickara, and Shrideep Pallickara, Members, IEEE

          Add to Reading List

          Source URL: galileo.cs.colostate.edu

          Language: English - Date: 2014-03-28 11:45:58
            36SHAttered The first concrete collision attack against SHA-1 https://shattered.io A collision is when two different documents have the same hash fingerprint

            SHAttered The first concrete collision attack against SHA-1 https://shattered.io A collision is when two different documents have the same hash fingerprint

            Add to Reading List

            Source URL: shattered.io

            - Date: 2017-02-21 16:44:42
              37Comments Received in Response to:  Request for Comments on Draft FIPS 202, SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions

              Comments Received in Response to: Request for Comments on Draft FIPS 202, SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions

              Add to Reading List

              Source URL: csrc.nist.gov

              - Date: 2017-02-24 15:05:30
                38SHAttered The first concrete collision attack against SHA-1 https://shattered.io A collision is when two different documents have the same hash fingerprint

                SHAttered The first concrete collision attack against SHA-1 https://shattered.io A collision is when two different documents have the same hash fingerprint

                Add to Reading List

                Source URL: shattered.it

                - Date: 2017-02-21 16:44:42
                  39(ARCHIVED as of AUGUST 5, 2015): DRAFT FIPS 202, SHA-3 Standard:  Permutation-Based Hash and Extendable-Output Functions

                  (ARCHIVED as of AUGUST 5, 2015): DRAFT FIPS 202, SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions

                  Add to Reading List

                  Source URL: csrc.nist.gov

                  - Date: 2017-03-01 15:35:52
                    40New Second Preimage Attacks on Dithered Hash Functions with Low Memory Complexity Muhammad Barham1,? , Orr Dunkelman1,? , Stefan Lucks2 , and Marc Stevens3 1

                    New Second Preimage Attacks on Dithered Hash Functions with Low Memory Complexity Muhammad Barham1,? , Orr Dunkelman1,? , Stefan Lucks2 , and Marc Stevens3 1

                    Add to Reading List

                    Source URL: marc-stevens.nl

                    - Date: 2017-08-13 07:48:58