Hash

Results: 3740



#Item
481Hashing / Information retrieval / Information science / Search algorithms / Hash table / Open addressing / Linear probing / SUHA / Universal hashing / Quadratic probing / Hash function / Double hashing

6.006 Intro to Algorithms Recitation 07 February 25, 2011

Add to Reading List

Source URL: courses.csail.mit.edu

Language: English - Date: 2011-02-25 14:33:37
482Search algorithms / Hashing / Error detection and correction / Hash function / Hash table / Big O notation / Cryptographic hash function / CohenSutherland algorithm

Introduction to Algorithms Massachusetts Institute of Technology Professors Srini Devadas and Constantinos (Costis) Daskalakis March 11, Spring 2009

Add to Reading List

Source URL: courses.csail.mit.edu

Language: English - Date: 2010-02-02 11:49:29
483

International Journal of Information Science and Computer Application (IJISCA) Vol), ppFormal Hash Compression Provenance Techniques for the Preservation of the Virtual Machine Log Auditor Environment Sean

Add to Reading List

Source URL: www.tyronegrandison.org

Language: English - Date: 2013-04-16 18:45:13
    484Information science / Information retrieval / Hashing / Computing / Search algorithms / Signal processing filter / Bloom filter / Information-centric networking / Filter / Electronic filter / Hash function / Domain name

    Bloom Filter based Inter-domain Name Resolution: A Feasibility Study Konstantinos V. Katsaros, Wei Koong Chai and George Pavlou University College London, UK Outline

    Add to Reading List

    Source URL: conferences2.sigcomm.org

    Language: English - Date: 2015-10-02 15:10:02
    485

    Black-box Property of Cryptographic Hash Functions Michal Rjaˇsko Comenius University in Bratislava Faculty of Mathematics, Physics and Informatics Department of Computer Science

    Add to Reading List

    Source URL: fps2011.dyndns.org

    Language: English
      486

      Applications of SAT Solvers to Cryptanalysis of Hash Functions Ilya Mironov and Lintao Zhang Microsoft Research, Silicon Valley Campus {mironov,lintaoz}@microsoft.com

      Add to Reading List

      Source URL: research.microsoft.com

      Language: English - Date: 2006-07-23 22:24:46
        487Distributed data storage / Kademlia / Chord / Tapestry / Pastry / Trie / Mainline DHT / Distributed hash table

        Kademlia: A Peer-to-peer Information System Based on the XOR Metric Petar Maymounkov and David Mazi`eres {petar,dm}@cs.nyu.edu http://kademlia.scs.cs.nyu.edu

        Add to Reading List

        Source URL: css.csail.mit.edu

        Language: English - Date: 2014-12-08 14:33:01
        488

        An Analysis of Compare-by-hash Val Henson Sun Microsystems Abstract

        Add to Reading List

        Source URL: valerieaurora.org

        Language: English - Date: 2009-02-18 00:08:43
          489

          Multicollision Attacks on Some Generalized Sequential Hash Functions M. Nandi David R. Cheriton School of Computer Science University of Waterloo Waterloo, Ontario N2L 3G1, Canada

          Add to Reading List

          Source URL: www.isical.ac.in

          Language: English - Date: 2011-12-28 03:46:39
            490

            Improved indifferentiability security analysis of chopMD Hash Function Donghoon Chang1? and Mridul Nandi2 1 Center for Information Security Technologies (CIST)

            Add to Reading List

            Source URL: www.isical.ac.in

            Language: English - Date: 2011-12-28 03:46:39
              UPDATE