Hash

Results: 3740



#Item
571Cryptography / Hashing / Error detection and correction / Cryptographic hash functions / Search algorithms / Commitment scheme / Hash function / Coin flipping / RSA / Crypt

Very-efficient flipping of many coins (between two parties) Luís T. A. N. Brandão University of Lisbon and Carnegie Mellon University

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2014-03-01 16:01:06
572

Analysis of the Kupyna-256 Hash Function Christoph Dobraunig, Maria Eichlseder, and Florian Mendel Graz University of Technology, Austria Abstract. The hash function Kupyna was recentl

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-10-01 11:25:53
    573

    Hash Tables 1 Hash Table in Primary Storage   Main parameter B = number of buckets

    Add to Reading List

    Source URL: www.imada.sdu.dk

    Language: English - Date: 2012-01-12 10:10:03
      574Cryptography / Key management / E-commerce / Public-key cryptography / Cryptocurrencies / Bitcoin / Elliptic Curve Digital Signature Algorithm / RSA / Electronic money / Key / Digital signature / Cryptographic hash function

      Hierarchical deterministic Bitcoin wallets that tolerate key leakage (Short paper) Gus Gutoski1 and Douglas Stebila2 1

      Add to Reading List

      Source URL: fc15.ifca.ai

      Language: English - Date: 2015-01-11 00:32:41
      575File sharing networks / Distributed data storage / File sharing / BitTorrent / Peer-to-peer / Tapestry / Anycast / WASTE / Distributed hash table / Peer-to-Peer Protocol

      ChunkCast: An Anycast Service for Large Content Distribution Byung-Gon Chun, Peter Wu, Hakim Weatherspoon, and John Kubiatowicz Computer Science Division University of California, Berkeley {bgchun,peterwu,hweather,kubitr

      Add to Reading List

      Source URL: iptps06.cs.ucsb.edu

      Language: English - Date: 2006-02-15 01:41:06
      576Cryptography / Message authentication codes / Pseudorandom function family / Pseudorandomness / Error detection and correction / Hash-based message authentication code / Advantage / Randomness extractor

      The Exact PRF-Security of NMAC and HMAC? Peter Gaˇzi, Krzysztof Pietrzak, and Michal Ryb´ar IST Austria JulyAbstract. NMAC is a mode of operation which turns a fixed input-length keyed hash function f into a

      Add to Reading List

      Source URL: pub.ist.ac.at

      Language: English - Date: 2014-07-24 05:23:52
      577

      Hash Tables 1 Hash Table in Primary Storage §  Main parameter B = number of buckets

      Add to Reading List

      Source URL: www.imada.sdu.dk

      Language: English - Date: 2012-03-15 07:52:32
        578Cryptography / Books on cryptography / Elliptic curve cryptography / Cryptanalysis / RSA / Key size / Public-key cryptography / Cryptographic hash function / Outline of cryptography / Cipher / Block cipher / Elliptic curve

        The Book Review Column1 by William Gasarch Department of Computer Science University of Maryland at College Park College Park, MD, 20742 email:

        Add to Reading List

        Source URL: www.cs.umd.edu

        Language: English - Date: 2014-06-30 10:38:30
        579

        Introduction Construction of hash functions Elliptic Curve L-Function Elliptic Curve Only Hash (ECOH) Hashing with Elliptic Curve L-Functions Conclusion

        Add to Reading List

        Source URL: www5.rz.rub.de

        Language: English - Date: 2012-07-23 07:34:30
          580

          B r e a k fa s t S p e c i a lt i e s * T he A ll -A merican $7.95 Two Eggs Any Style, Choice of Ham, Sausage or Bacon Hash Browns and Toast * T he T raveler $7.25 Scrambled Eggs, Diced Ham

          Add to Reading List

          Source URL: cheyenne.littleamerica.com

          Language: English - Date: 2013-03-20 17:41:34
            UPDATE