Hash

Results: 3740



#Item
591

Black-Box Analysis of the Block-Cipher-Based Hash-Function Constructions from PGV J. Black ∗ P. Rogaway

Add to Reading List

Source URL: web.cecs.pdx.edu

Language: English - Date: 2009-09-29 10:04:54
    592

    Security Analysis of the Mode of JH Hash Function Rishiraj Bhattacharyya1 , Avradip Mandal2 , and Mridul Nandi3? 1 3

    Add to Reading List

    Source URL: www.isical.ac.in

    Language: English - Date: 2011-12-28 03:46:39
      593Distributed data storage / Computing / Concurrent computing / Distributed computing / Tapestry / Key-based routing / Distributed hash table / Peer-to-peer / Scalability / Routing / Chord / Eventual consistency

      Enforcing Routing Consistency in Structured Peer-to-Peer Overlays: Should We and Could We? Wei Chen Xuezheng Liu Microsoft Research Asia {weic, xueliu}@microsoft.com

      Add to Reading List

      Source URL: iptps06.cs.ucsb.edu

      Language: English - Date: 2006-02-15 01:41:08
      594Information science / Search algorithms / Information retrieval / Nearest neighbor search / Locality-sensitive hashing / Similarity search / PageRank / Search engine indexing / Computational geometry / Hash function / IDistance / Search engine technology

      Predictive Indexing for Fast Search Sharad Goel Yahoo! Research New York, NY 10018

      Add to Reading List

      Source URL: hunch.net

      Language: English - Date: 2009-01-12 15:37:21
      595

      Læs mere i vores artikel i STOF nr. 22 på www.stofbladet.dk: ’Får man abstinenser af at holde op med at ryge hash?’

      Add to Reading List

      Source URL: psy.au.dk

      Language: Danish - Date: 2013-12-06 04:43:59
        596

        4 EE FR Hash Tables and Associative Arrays

        Add to Reading List

        Source URL: people.mpi-inf.mpg.de

        Language: English - Date: 2008-08-21 07:36:55
          597Cryptography / Cryptographic hash functions / Hashing / Error detection and correction / Universal one-way hash function / Preimage attack / Collision resistance / Hash function / Hash list / SHA-3 / One-way compression function

          Introduction MD New Results I

          Add to Reading List

          Source URL: www.hyperelliptic.org

          Language: English - Date: 2008-09-27 14:59:29
          598Cryptography / Stream ciphers / Cryptographic hash functions / Message authentication codes / VEST / A5/1 / Data Encryption Standard / Block cipher modes of operation / Confusion and diffusion / Crypt / Rabbit / Key size

          The Stream Cipher Rabbit1 Martin Boesgaard Mette Vesterager Erik Zenner

          Add to Reading List

          Source URL: www.ecrypt.eu.org

          Language: English - Date: 2007-03-29 16:18:56
          599Game theory / Price of anarchy / Nash equilibrium / Economic equilibrium / Peer-to-peer / Distributed hash table

          Selfish Caching in Distributed Systems: A Game-Theoretic Analysis ∗ †

          Add to Reading List

          Source URL: www.oceanstore.org

          Language: English - Date: 2004-06-03 15:23:36
          600

          Microsoft PowerPoint - lec4-hash-mac-sig

          Add to Reading List

          Source URL: inst.eecs.berkeley.edu

          Language: English - Date: 2008-09-10 13:59:53
            UPDATE