Hash

Results: 3740



#Item
401

T HE C O N T I N E N T AL GRAND BUFFET 29 Eggs Benedict, Buttermilk Pancakes with Choice of Toppings, French Toast, Sausage, Bacon, Breakfast Potatoes, Hash Browns, Build-Your-Own Breakfast Sandwich and Burrito, Made-t

Add to Reading List

Source URL: www.icchicagohotel.com

Language: English - Date: 2016-03-25 11:55:58
    402Hashing / Cryptographic hash function / Cryptography / Py

    CENTRIFUGE A password hashing algorithm Rafael Alvarez

    Add to Reading List

    Source URL: password-hashing.net

    Language: English - Date: 2014-04-03 12:30:43
    403Computing / Dynamic programming / Search algorithms / Dynamic time warping / Time series analysis / Computational linguistics / Information science / Humancomputer interaction / Speech recognition / Hash function / MIDI / Deep learning

    Accelerating Multimodal Sequence Retrieval with Convolutional Networks Daniel P. W. Ellis LabROSA Columbia University New York, NY 10027

    Add to Reading List

    Source URL: colinraffel.com

    Language: English - Date: 2015-12-30 23:12:50
    404Mathematics / Geometry / Search algorithms / Dynamic programming / Information science / Dynamic time warping / Time series analysis / Hamming distance / Sequence / Hash function / Pattern recognition

    ACCELERATING MULTIMODAL SEQUENCE RETRIEVAL WITH CONVOLUTIONAL NETWORKS Laboratory for the Recognition and Organization of Speech and Audio Colin Raffel () and Daniel P. W. Ellis (), L

    Add to Reading List

    Source URL: colinraffel.com

    Language: English
    405Cryptography / Cryptographic hash functions / NIST hash function competition / SHA-3 / Sponge function / Password / Crypt / Hash function / Exclusive or / Key derivation function / Lyra2

    Gambit A sponge based, memory hard key derivation function Krisztián Pintér ()  Pseudocode S

    Add to Reading List

    Source URL: password-hashing.net

    Language: English - Date: 2014-04-14 07:18:05
    406Cryptography / Cryptographic hash functions / Password / Security / Crypt / SHA-1 / Encryption / Database encryption

    Microsoft Word - SEISYS_FATCAInformationDelivery_CredentialForm.docx

    Add to Reading List

    Source URL: www.estv.admin.ch

    Language: English
    407File sharing / BitTorrent / Virtualization / Peer-to-peer / Node / Computer cluster / Distributed computing / Scalability / Distributed hash table / Operating-system-level virtualization

    Lightweight Emulation to Study Peer-to-Peer Systems ∗ Lucas Nussbaum and Olivier Richard Laboratoire Informatique et Distribution - IMAG

    Add to Reading List

    Source URL: www.loria.fr

    Language: English - Date: 2011-10-12 09:35:39
    408Cryptography / Cryptographic hash functions / Key management / Pseudorandomness / Search algorithms / PBKDF2 / Password / Scrypt / Crypt / Key derivation function / Pseudorandom function family / Salt

    Lanarea DF Haneef Mubarak Abstract The flaws of current and previous methods of utilization, storage, and conversion of passwords into secure keys, namely plaintext, hashing, and key derivation are explored. A novel, yet

    Add to Reading List

    Source URL: password-hashing.net

    Language: English
    409Cryptography / Secure communication / Cryptographic hash functions / Cryptographic protocols / Hashing / Transport Layer Security / Collision attack / Cipher suite / MD5 / OpenSSL / SHA-2 / Man-in-the-middle attack

    Transcript Collision Attacks: Breaking Authentication in TLS, IKE, and SSH Karthikeyan Bhargavan Ga¨etan Leurent

    Add to Reading List

    Source URL: mitls.org

    Language: English - Date: 2016-01-06 07:34:05
    410

    Cryptanalysis of the MCSSHA Hash Functions Jean-Philippe Aumasson1 and Mar´ıa Naya-Plasencia2 1 2

    Add to Reading List

    Source URL: 131002.net

    Language: English - Date: 2012-08-14 06:46:38
      UPDATE