Hash

Results: 3740



#Item
541

Linework-small hash-navy.eps

Add to Reading List

Source URL: science.nd.edu

Language: English - Date: 2016-01-13 15:18:28
    542

    A Generalization of PGV-Hash Functions and Security Analysis in Black-Box Model Wonil Lee1 , Mridul Nandi2 , Palash Sarkar2 , Donghoon Chang1 , Sangjin Lee1 , and Kouichi Sakurai3 1

    Add to Reading List

    Source URL: www.isical.ac.in

    Language: English - Date: 2011-12-28 03:46:39
      543Hashing / Search algorithms / Hash function / Cryptographic hash function / Join / Dynamic programming / Record linkage / Hash table / Dynamic perfect hashing

      Optimal Hashing Schemes for Entity Matching Nilesh Dalvi Vibhor Rastogi Anirban Dasgupta

      Add to Reading List

      Source URL: www2013.wwwconference.org

      Language: English - Date: 2014-07-21 08:47:06
      544

      . . Security Reductions of Cryptographic Hash Functions .

      Add to Reading List

      Source URL: www1.spms.ntu.edu.sg

      Language: English - Date: 2011-08-31 02:03:42
        545Key management / Cryptography standards / Cryptography / FIPS 201 / Standards / Key size / Cryptographic hash function / Key / Cryptographic Module Validation Program / Digital Signature Algorithm / Public-key cryptography / Smart card

        NIST Special Publication

        Add to Reading List

        Source URL: nvlpubs.nist.gov

        Language: English - Date: 2015-06-10 13:59:58
        546

        Towards Optimal Double-Length Hash Functions Mridul Nandi Applied Statistics Unit Indian Statistical Institute Kolkata, India mridul

        Add to Reading List

        Source URL: www.isical.ac.in

        Language: English - Date: 2011-12-28 03:46:39
          547Cryptography / Cryptographic hash functions / Error detection and correction / SHA-1 / SHA-2 / MD5 / NIST hash function competition / SHA-3 / Elliptic curve only hash / Elliptic Curve Digital Signature Algorithm / Libgcrypt / FORK-256

          Elliptic Curve Hash (and Sign) ECOH (and the 1-up problem for ECDSA) Daniel R. L. Brown Certicom Research ECC 2008, Utrecht, Sep

          Add to Reading List

          Source URL: www.hyperelliptic.org

          Language: English - Date: 2008-09-27 14:59:29
          548

          (Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others (Extended Version) Shuang Wu1 , Dengguo Feng1 , Wenling Wu1 , Jian Guo2 , Le Dong1 , and Jian Zou1 1 State Key Laboratory of Information Securit

          Add to Reading List

          Source URL: eprint.iacr.org

          Language: English - Date: 2012-09-10 00:05:29
            549Computational neuroscience / Neuroscience / Nervous system / Sensory systems / Artificial neural networks / Applied mathematics / Receptive field / Cerebellar model articulation controller / One-key MAC / Hash function / Contrast / Image segmentation

            UNH_CMAC Version 2.1 The University of New Hampshire Implementation of the Cerebellar Model Arithmetic Computer - CMAC August 31, 1994 (last modified July, 1996) W. Thomas Miller and Filson H. Glanz

            Add to Reading List

            Source URL: incompleteideas.net

            Language: English - Date: 2013-04-20 17:24:26
            550

            Hash-routing Schemes for Information Centric Networking Lorenzo Saino, Ioannis Psaras and George Pavlou Department of Electrical and Electronics Engineering University College London London, UK

            Add to Reading List

            Source URL: conferences.sigcomm.org

            Language: English - Date: 2013-07-19 09:34:32
              UPDATE