Hash

Results: 3740



#Item
451Cryptography / Cryptographic hash functions / Public-key cryptography / Hashing / Search algorithms / CramerShoup cryptosystem / RSA / ElGamal encryption / Crypt / Hash function / Ciphertext / Universal one-way hash function

This article is the final version submitted by the authors to the IACR and to Springer-Verlag onThe version published by Springer-Verlag is available at http://dx.doi.orgNew Techn

Add to Reading List

Source URL: www.normalesup.org

Language: English - Date: 2015-02-21 09:51:42
452

Multivariate hash functions: constructions and security Jean-Philippe Aumasson

Add to Reading List

Source URL: 131002.net

Language: English - Date: 2012-08-14 06:46:57
    453Cryptography / Public-key cryptography / Notary / Computer access control / Digital signature / Signature / Cryptographic hash function / Authentication / Seal / Commitment scheme / Secure multi-party computation / Challengeresponse authentication

    The BiBa One-Time Signature and Broadcast Authentication Protocol  Adrian Perrig

    Add to Reading List

    Source URL: www.netsec.ethz.ch

    Language: English - Date: 2015-06-01 09:06:14
    454Hashing / Search algorithms / Statistical theory / Bloom filter / Bit array / Probability distributions / Hash function / Entropy / Golomb coding / KullbackLeibler divergence / Birthday problem

    CS 493: Algorithms for Massive Data Sets Feb 21, Local Models, Bloom Filter

    Add to Reading List

    Source URL: www.cs.princeton.edu

    Language: English - Date: 2002-03-15 13:15:13
    455

    Herding Hash Functions and the Nostradamus Attack John Kelsey1 and Tadayoshi Kohno2 1 National Institute of Standards and Technology,

    Add to Reading List

    Source URL: homes.cs.washington.edu

    Language: English - Date: 2010-01-06 01:14:49
      456Search algorithms / Sorting algorithms / Data types / Binary trees / Binary search tree / Heap / Merge sort / Set / Best /  worst and average case / Insertion sort / Hash table / Binary search algorithm

      October 15, Fall 2008 Quiz 1 Introduction to Algorithms Massachusetts Institute of Technology

      Add to Reading List

      Source URL: courses.csail.mit.edu

      Language: English - Date: 2009-05-07 21:09:20
      457Computing / Internet / Internet Standards / Internet protocols / Network architecture / DNSSEC / Domain Name System Security Extensions / Key management / Public-key cryptography / Domain Name System / Hash table / Namespace

      Design of a Secure and Decentralized Location Service for Agent Platforms B.J. Overeinder1 , M.A. Oey1 , R.J. Timmer1 , R. van Schouwen1 , E. Rozendaal2 , and F.M.T. Brazier1 1

      Add to Reading List

      Source URL: www.nlnetlabs.nl

      Language: English - Date: 2009-06-27 06:06:52
      458Computer programming / Arrays / Mathematical analysis / Computing / Finite automata / Trie / B-tree / Master theorem / Hash table

      October 14, Spring 2009 Quiz 1 Solutions Introduction to Algorithms Massachusetts Institute of Technology

      Add to Reading List

      Source URL: courses.csail.mit.edu

      Language: English - Date: 2010-02-02 11:49:58
      459

      The Boston Hash House Harriers Hymnal

      Add to Reading List

      Source URL: bostonhash.wdfiles.com

      Language: English - Date: 2012-09-17 05:03:26
        460Hashing / Information retrieval / Information science / Search algorithms / Hash table / Universal hashing / Linear probing / SUHA / Hash function / Double hashing / Open addressing / Rolling hash

        Microsoft PowerPoint - lecture7_HashingIII.pptx

        Add to Reading List

        Source URL: courses.csail.mit.edu

        Language: English - Date: 2011-03-31 12:24:54
        UPDATE