Hash

Results: 3740



#Item
581

New Russian Hash Function Standard Dmitry Khovratovich Alexey Urivskiy JSC “InfoTeCS”, Russia

Add to Reading List

Source URL: cis.sjtu.edu.cn

Language: English - Date: 2012-12-05 11:26:11
    582

    International Journal of Information Science and Computer Application (IJISCA) Vol), ppFormal Hash Compression Provenance Techniques for the Preservation of the Virtual Machine Log Auditor Environment Sean

    Add to Reading List

    Source URL: www.proficiencylabs.com

    Language: English - Date: 2013-04-16 18:45:13
      583Search algorithms / Data types / Procedural programming languages / Arrays / Hash table / Ur / Doubly linked list / Const / Linked list / Recursion / Hash function / Null

      PDF Document

      Add to Reading List

      Source URL: genome.sph.umich.edu

      Language: English - Date: 2012-10-08 20:20:43
      584Wireless networking / Computing / Routing algorithms / Routing protocols / Network architecture / Network management / Distributed data storage / Routing / Wireless sensor network / Computer network / Hub / Distributed hash table

      Starburst SSD: An Efficient Protocol for Selective Dissemination Tahir Azim Qasim Mansoor

      Add to Reading List

      Source URL: sing.stanford.edu

      Language: English - Date: 2014-11-10 18:30:14
      585

      . . Security Reductions of Cryptographic Hash Functions .

      Add to Reading List

      Source URL: web.spms.ntu.edu.sg

      Language: English - Date: 2012-03-13 12:15:13
        586Information retrieval / Hashing / Information science / Search algorithms / Error detection and correction / Cryptography / Cryptographic hash functions / Arrays / Hash table / Hash function / Hash list / Hash

        Efficient Testing Operations on Dynamic Graph Structures using Strong Hash Functions Hoyt Koepke∗ Elizabeth Thompson∗

        Add to Reading List

        Source URL: www.stat.washington.edu

        Language: English - Date: 2010-03-17 13:23:00
        587Cryptography / Cryptographic hash functions / Hashing / Error detection and correction / NIST hash function competition / SHA-3 / Secure Hash Algorithm / SHA-2 / SHA-1 / Secure Hash Standard / Crypt / Hash function

        Additional Secure hash Algorithm Standards Offer New Opportunities for Data Protection

        Add to Reading List

        Source URL: csrc.nist.gov

        Language: English - Date: 2015-09-24 10:22:35
        588

        Eggs, Omelette & Scramble Served with Hash Browns or a Cup of Grits & Your Choice of Toast (Sourdough, Wheat, White, Rye, English Muffin) 2 Eggs (Any Style)

        Add to Reading List

        Source URL: www.emilsburger.com

        Language: English - Date: 2016-01-05 01:01:47
          589

          Published in Journal of Computer Security 5(3):213–223, AUTHENTICATION OF SEQUENCES WITH THE SL2 HASH FUNCTION: APPLICATION TO VIDEO SEQUENCES Jean-Jacques Quisquater

          Add to Reading List

          Source URL: joye.site88.net

          Language: English - Date: 2015-09-04 19:44:14
            590

            Distributed Hash Tables and Self Organizing Networkslecture Jonathan Perry Announcements

            Add to Reading List

            Source URL: css.csail.mit.edu

            Language: English - Date: 2014-12-08 14:33:01
              UPDATE