Hash

Results: 3740



#Item
471

SPHINCS: practical stateless hash-based signatures Daniel J. Bernstein1,3 , Daira Hopwood2 , Andreas Hülsing3 , Tanja Lange3 , Ruben Niederhagen3 , Louiza Papachristodoulou4 , Michael Schneider, Peter Schwabe4 , and Zoo

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-02-02 09:15:08
    472Cryptography / Computing / Information science / Cryptographic hash functions / Digital preservation / Records management / Error detection and correction / Digital technology / File Fixity / Checksum / BagIt / Preservation Metadata: Implementation Strategies

    Staffing For Effective Digital Preservation

    Add to Reading List

    Source URL: www.digitalpreservation.gov

    Language: English - Date: 2016-01-20 13:45:27
    473Search algorithms / Classes of computers / Battleship / Gaming / Binary search algorithm / Hash function / Software

    Microsoft Word - unpluggedDec2006-1.doc

    Add to Reading List

    Source URL: swaygrantham.co.uk

    Language: English - Date: 2014-07-05 03:36:49
    474

    High Speed FPGA Implementation of Cryptographic Hash Function by Olakunle Esuruoso

    Add to Reading List

    Source URL: 131002.net

    Language: English - Date: 2012-08-14 06:46:49
      475

          Satellites Problem statement for the Final Round, Hash Code 2016

      Add to Reading List

      Source URL: hashcode.withgoogle.com

      Language: English
        476Cryptocurrencies / E-commerce / Economy / Money / Proof-of-stake / Peercoin / Bitcoin network / Bitcoin / Blockchain / Cryptographic hash function / Consensus / BlackCoin

        BlackCoin’s Proof-of-Stake Protocol v2 Pavel Vasin www.blackcoin.co Abstract—The current Proof of Stake protocol has several potential security issues: coin age can be abused by malicious nodes to gain significant ne

        Add to Reading List

        Source URL: blackcoin.co

        Language: English - Date: 2016-02-17 22:48:53
        477

        Why narrow-pipe cryptographic hash functions are not a match to wide-pipe cryptographic hash functions? Danilo Gligoroski Faculty of Information Technology, Mathematics and Electrical Engin

        Add to Reading List

        Source URL: people.item.ntnu.no

        Language: English - Date: 2010-11-24 06:10:58
          478Cryptography / Information retrieval / Search algorithms / Information science / Hashing / Error detection and correction / Hash function / Cryptographic hash function / RSA

          Efficient Negative Databases from Cryptographic Hash Functions George Danezis, Claudia Diaz, Sebastian Faust, Emilia K¨asper, Carmela Troncoso, and Bart Preneel K.U. Leuven, ESAT/COSIC, Kasteelpark Arenberg 10,

          Add to Reading List

          Source URL: www0.cs.ucl.ac.uk

          Language: English - Date: 2013-10-10 06:48:57
          479Structured storage / Hadoop / Search algorithms / Apache HBase / Data management / Hash function / NoSQL / Data / Clickstream

          High  Performance  Clickstream  Analy6cs     with  Apache  HBase/Phoenix       -­‐  CDK  Global  (formerly  ADP  Dealer  Services)  

          Add to Reading List

          Source URL: phoenix.apache.org

          Language: English - Date: 2016-04-08 13:13:23
          480

          Linearization Framework for Collisions in Hash Functions Willi Meier

          Add to Reading List

          Source URL: indocrypt09.inria.fr

          Language: English - Date: 2009-12-18 10:33:52
            UPDATE