Hash

Results: 3740



#Item
501Distributed data storage / Distributed hash table / Pastry / Peer-to-peer / Distributed computing / Tapestry / Kademlia

F2F: reliable storage in open networks Jinyang Li Frank Dabek UC Berkeley/MIT MIT jinyang, fdabek @csail.mit.edu

Add to Reading List

Source URL: iptps06.cs.ucsb.edu

Language: English - Date: 2006-02-15 01:41:07
502

Ideal Hash Trees Phil Bagwell Hash Trees with nearly ideal characteristics are described. These Hash Trees require no initial root hash table yet are faster and use significantly less space than chained or double hash tr

Add to Reading List

Source URL: idea.popcount.org

Language: English
    503Cryptography / Password / Security / Cryptographic hash functions / Salt / Random password generator / Passwd / Crypt / Dictionary attack / Password strength / OTPW

    A New Attack on Random Pronounceable Password Generators Ganesan and Davies A New Attack on Random Pronounceable Password Generators

    Add to Reading List

    Source URL: www.findravi.com

    Language: English - Date: 2009-04-03 23:54:54
    504

    Simple and Space-Efficient Minimal Perfect Hash Functions ⋆ Fabiano C. Botelho1 , Rasmus Pagh2 and Nivio Ziviani1

    Add to Reading List

    Source URL: cmph.sourceforge.net

    Language: English - Date: 2012-03-21 00:30:01
      505Distributed data storage / Computing / Computer programming / Concurrent computing / Tapestry / Distributed hash table / Chord / Pastry / Routing / Node / Tree / Freenet

      Distributed Object Location in a Dynamic Network Kirsten Hildrum, John D. Kubiatowicz, Satish Rao and Ben Y. Zhao Computer Science Division, University of California at Berkeley hildrum, kubitron, satishr, ravenben@cs

      Add to Reading List

      Source URL: www.oceanstore.org

      Language: English - Date: 2002-07-26 16:46:48
      506Routing / Computer networking / Forwarding plane / Trie / Radix tree / Forwarding information base / Named data networking / Packet forwarding / Forwarding / Hash table / Router / Routing table

      Scalable Name-Based Packet Forwarding: From Millions to Billions Tian Song Haowei Yuan

      Add to Reading List

      Source URL: conferences2.sigcomm.org

      Language: English - Date: 2015-10-01 13:10:42
      507Cryptography / Hashing / Search algorithms / Cryptographic hash functions / Hash function / Hash table / RSA / Crypt / Block cipher / Universal hashing / Scrypt

      STRONGER KEY DERIVATION VIA SEQUENTIAL MEMORY-HARD FUNCTIONS COLIN PERCIVAL Abstract. We introduce the concepts of memory-hard algorithms and sequential memory-hard functions, and argue that in order for key derivation f

      Add to Reading List

      Source URL: www.daemonology.net

      Language: English - Date: 2009-06-11 07:29:01
      508

      Hash Brown Sliders Ready Time: 18 min | Prep time: 10 min | Cook time: 8 min Ingredients: Directions:

      Add to Reading List

      Source URL: www.potatogoodness.com

      Language: English - Date: 2015-03-26 09:34:35
        509

        Leftover Hash Lemma, Revisited Boaz Barak ∗ Yevgeniy Dodis†

        Add to Reading List

        Source URL: ftp.cs.nyu.edu

        Language: English - Date: 2011-09-03 15:47:31
          510

          Full Cryptanalysis of LPS and Morgenstern Hash Functions Christophe Petit1? , Kristin Lauter2 and Jean-Jacques Quisquater1?? 1 UCL Crypto Group? ? ? , 2 Microsoft Research.

          Add to Reading List

          Source URL: www.uclouvain.be

          Language: English - Date: 2011-12-14 05:30:36
            UPDATE