Hash

Results: 3740



#Item
41SHAttered The first concrete collision attack against SHA-1 https://shattered.io A collision is when two different documents have the same hash fingerprint

SHAttered The first concrete collision attack against SHA-1 https://shattered.io A collision is when two different documents have the same hash fingerprint

Add to Reading List

Source URL: shattered.io

- Date: 2017-02-21 16:44:42
    42Stellingen bij het proefschrift Attacks on Hash Functions and Applications door Marc Stevens

    Stellingen bij het proefschrift Attacks on Hash Functions and Applications door Marc Stevens

    Add to Reading List

    Source URL: marc-stevens.nl

    - Date: 2017-08-13 07:48:58
      43Theory and Practice of Logic Programming  1 Efficient Tabling of Structured Data with Enhanced Hash-Consing

      Theory and Practice of Logic Programming 1 Efficient Tabling of Structured Data with Enhanced Hash-Consing

      Add to Reading List

      Source URL: www.sci.brooklyn.cuny.edu

      - Date: 2012-05-21 09:47:37
        442013 IEEE International Conference on Computer Vision  Learning Hash Codes with Listwise Supervision Jun Wang Business Analytics and Mathematical Sciences IBM T. J. Watson Research Center

        2013 IEEE International Conference on Computer Vision Learning Hash Codes with Listwise Supervision Jun Wang Business Analytics and Mathematical Sciences IBM T. J. Watson Research Center

        Add to Reading List

        Source URL: www.ee.columbia.edu

        - Date: 2014-04-27 03:25:50
          45Deep Learning of Binary Hash Codes for Fast Image Retrieval Kevin Lin† , Huei-Fang Yang† , Jen-Hao Hsiao‡ , Chu-Song Chen† † Academia Sinica, Taiwan ‡ Yahoo! Taiwan {kevinlin311.tw,song}@iis.sinica.edu.tw, hf

          Deep Learning of Binary Hash Codes for Fast Image Retrieval Kevin Lin† , Huei-Fang Yang† , Jen-Hao Hsiao‡ , Chu-Song Chen† † Academia Sinica, Taiwan ‡ Yahoo! Taiwan {kevinlin311.tw,song}@iis.sinica.edu.tw, hf

          Add to Reading List

          Source URL: www.iis.sinica.edu.tw

            46Streaming videos  Problem statement for Online Qualification Round, Hash Code 2017     

            Streaming videos  Problem statement for Online Qualification Round, Hash Code 2017     

            Add to Reading List

            Source URL: web-uploads.ebury.com

            - Date: 2017-03-23 08:10:56
              47Hash Bit Selection: a Unified Solution for Selection Problems in Hashing Xianglong Liu† Junfeng He‡∗ Bo Lang† Shih-Fu Chang‡ †

              Hash Bit Selection: a Unified Solution for Selection Problems in Hashing Xianglong Liu† Junfeng He‡∗ Bo Lang† Shih-Fu Chang‡ †

              Add to Reading List

              Source URL: www.nlsde.buaa.edu.cn

              - Date: 2013-05-04 05:50:50
                48Multi-View Complementary Hash Tables for Nearest Neighbor Search Xianglong Liu† Lei Huang† Cheng Deng‡ Jiwen Lu ♮ Bo Lang†

                Multi-View Complementary Hash Tables for Nearest Neighbor Search Xianglong Liu† Lei Huang† Cheng Deng‡ Jiwen Lu ♮ Bo Lang†

                Add to Reading List

                Source URL: www.cv-foundation.org

                - Date: 2015-10-24 15:11:54
                  49The Skein Hash Function Family Version 1.3 — 1 Oct 2010 Niels Ferguson Stefan Lucks Bruce Schneier

                  The Skein Hash Function Family Version 1.3 — 1 Oct 2010 Niels Ferguson Stefan Lucks Bruce Schneier

                  Add to Reading List

                  Source URL: www.schneier.com

                  - Date: 2015-12-10 18:36:29
                    50Hash-Based Techniques for High-Speed Packet Processing Adam Kirsch, Michael Mitzenmacher, and George Varghese Abstract Hashing is an extremely useful technique for a variety of high-speed packet-processing applications i

                    Hash-Based Techniques for High-Speed Packet Processing Adam Kirsch, Michael Mitzenmacher, and George Varghese Abstract Hashing is an extremely useful technique for a variety of high-speed packet-processing applications i

                    Add to Reading List

                    Source URL: www.eecs.harvard.edu

                    - Date: 2008-11-03 16:38:06