Hash

Results: 3740



#Item
421Cryptography / Key management / Cryptographic hash functions / Key derivation function / PBKDF2 / Password cracking / Password / Key stretching / Salt / Scrypt / Crypt / Key

The Catena Password-Scrambling Framework Christian Forler∗ Stefan Lucks†

Add to Reading List

Source URL: password-hashing.net

Language: English - Date: 2015-09-29 12:17:24
422

BASUG Half-Day Training Announcement The DATA step hash object can be used for a surprising variety of tasks, including table look-ups, joins, and aggregation. This course offers an introduction to the hash object, as we

Add to Reading List

Source URL: www.basug.org

Language: English - Date: 2016-05-16 19:40:59
    423

    A preliminary version of this paper appears in the proceedings of EurocryptThis is the full version. Hash-Function based PRFs: AMAC and its Multi-User Security Mihir Bellare1

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2016-03-01 14:57:53
      424Search algorithms / Information science / Information retrieval / Hashing / Computer programming / Hash table / Hash function / Trie / Judy array / Hash / Cuckoo hashing / 2-choice hashing

      Application Note: Scalable HashingProblem How can you use Judy to create a scalable hash table with outstanding performance and automatic scaling, while avoiding the complexity of dynamic hashing?

      Add to Reading List

      Source URL: judy.sourceforge.net

      Language: English - Date: 2004-09-10 16:20:39
      425

      How (Not) to Efficiently Dither Blockcipher-Based Hash Functions? Jean-Philippe Aumasson1∗ and Raphael C.-W. Phan2† 2 1

      Add to Reading List

      Source URL: 131002.net

      Language: English - Date: 2012-08-14 06:46:45
        426

        Concurrent Hash Tables: Fast and General?(!) Tobias Maier1 , Peter Sanders1 , and Roman Dementiev2 1 2 Karlsruhe Institute of Technology, Karlsruhe, Germany

        Add to Reading List

        Source URL: arxiv.org

        Language: English - Date: 2016-01-17 21:17:41
          427Computer architecture / Computing / GPGPU / Video cards / Parallel computing / Graphics hardware / Computer engineering / Kepler / General-purpose computing on graphics processing units / Graphics processing unit / Hash table / Tesla

          MemcachedGPU: Scaling-up Scale-out Key-value Stores Mike O’Connor NVIDIA / UT-Austin There is a continuously growing demand for higher

          Add to Reading List

          Source URL: acmsocc.github.io

          Language: English - Date: 2016-02-21 03:10:51
          428Mathematics / Elementary mathematics / Music / Functions and mappings / Search algorithms / Calques / Earworm / Music psychology / Advanced Encryption Standard / Derivative / Variable / Hash function

          The earworm Password Hashing Algorithm Password Hashing Competition Submission Document (Round 1) Daniel Franke <> March 31, 2014

          Add to Reading List

          Source URL: password-hashing.net

          Language: English - Date: 2014-04-03 12:32:13
          429

          Faster Multicollisions∗ Jean-Philippe Aumasson FHNW, Windisch, Switzerland Abstract. Joux’s multicollision attack is one of the most striking results on hash functions and also one of the simplest: it computes a k-co

          Add to Reading List

          Source URL: 131002.net

          Language: English - Date: 2012-08-14 06:46:45
            UPDATE