Hash

Results: 3740



#Item
391Computing / Concurrent computing / Distributed data storage / Computer network security / Multi-agent systems / Spamming / Distributed computing / Cyberwarfare / Botnet / Command and control / Distributed hash table / Kad network

Tsunami: A parasitic, indestructible botnet on Kad Ghulam Memon, Jun Li & Reza Rejaie Peer-to-Peer Networking and

Add to Reading List

Source URL: mirage.cs.uoregon.edu

Language: English - Date: 2013-04-22 13:17:57
392

ACFrOgBd-7vfLHSP4aGCzaEKgTFPa2MiCYvmcTl...&hash=l56jjp5p81h96gc523tus0s8fvco1lir

Add to Reading List

Source URL: www.nirs.org

- Date: 2015-10-16 17:33:28
    393

    Perfectly One-Way Probabilistic Hash Functions (Preliminary Version) Ran Canetti∗ Daniele Micciancio†

    Add to Reading List

    Source URL: omereingold.files.wordpress.com

    Language: English - Date: 2014-10-21 18:21:58
      394

      Chapter 8 Implementation Pitfalls We have now learned about several very important cryptographic objects, including block ciphers, encryption schemes, message authentication schemes, and hash functions. Moreover, we disc

      Add to Reading List

      Source URL: cseweb.ucsd.edu

      Language: English - Date: 2005-03-01 14:19:32
        395Cryptography / Cryptographic hash functions / Hashing / Cryptographic software / Key management / Crypt / Scrypt / SHA-2 / Password / Hash function / PBKDF2 / Salt

        Rig∗ : A simple, secure and flexible design for Password Hashing Version 2.0 Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-Delhi), India

        Add to Reading List

        Source URL: password-hashing.net

        Language: English - Date: 2014-10-16 08:19:35
        396

        Crypto Update for BLU annual keysigning – Bill n1vux NEWS * RSA token break _https://www.schneier.com/blog/archivesdetails_of_the.html_ * Mac OSX Lion Security Flaw Permits Non-Root PWD Hash Views  _http://w

        Add to Reading List

        Source URL: www.blu.org

        Language: English - Date: 2011-09-25 21:40:13
          397

          An extended abstract of this paper appears in Advances in Cryptology – CRYPTO ’08, Lecture Notes in Computer Science Vol. 5157, D. Wagner ed., Springer-Verlag, 2008. This is the full version. Programmable Hash Functi

          Add to Reading List

          Source URL: www.kjdf.de

          Language: English - Date: 2014-06-10 05:37:38
            398Computing / Aggregation / Natural language processing / Information science / Cryptographic hash function / R-tree / HTML element / Tree / Radio-frequency identification / Humancomputer interaction

            Physical aggregated objects and dependability Objets physiques agr´eg´es et sˆuret´e de fonctionnement Fabrice Ben Hamouda Lundi 13 SeptembreR´

            Add to Reading List

            Source URL: www.normalesup.org

            Language: English - Date: 2015-02-21 09:51:42
            UPDATE