Hash

Results: 3740



#Item
601

Provable Security of Cryptographic Hash Functions Mohammad Reza Reyhanitabar Centre for Computer and Information Security Research University of Wollongong Australia

Add to Reading List

Source URL: web.spms.ntu.edu.sg

Language: English - Date: 2012-08-24 06:11:58
    602Cryptography / Cryptographic hash functions / Search algorithms / Hashing / Revenue stamps / Error detection and correction / Hash function / Digital signature / Universal one-way hash function / Claw-free permutation / E-stamping

    How to Time-Stamp a Digital Document Stuart Haber W. Scott Stornetta

    Add to Reading List

    Source URL: www.anf.es

    Language: English - Date: 2014-05-12 07:16:17
    603Distributed data storage / Concurrent computing / Computing / Distributed computing / Distributed hash table / Tapestry / Overlay network / Peer-to-peer / Chord / Gnutella / Pastry / Node

    J Supercomput: 15–42 DOIs11227Peer-exchange schemes to handle mismatch in peer-to-peer systems Tongqing Qiu · Edward Chan · Mao Ye ·

    Add to Reading List

    Source URL: www.cs.ucsb.edu

    Language: English - Date: 2011-12-21 16:04:05
    604

    A SAT-based preimage analysis of reduced KECCAK hash functions August 5, 2010 Pawel Morawiecki1 and Marian Srebrny2 1

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2010-10-19 10:06:41
      605

      Appears in Fast Software Encryption(FSE 2004), Lecture Notes in Computer Science, Vol. 3017, Springer-Verlag. This is the full version. Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for P

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2009-08-09 19:41:15
        606

        The Past, Present and Future of Hash Functions -a Rehash of some Old and New results Ivan Damgård Århus University

        Add to Reading List

        Source URL: fse2011.mat.dtu.dk

        Language: English - Date: 2011-03-01 10:06:33
          607Concurrent computing / Distributed data storage / File sharing networks / Computing / File sharing / Distributed computing / Distributed hash table / Gnutella / Peer-to-peer / Chord / Gossip protocol / Flooding

          Gossip-based Search Selection in Hybrid Peer-to-Peer Networks M. Zaharia and S. Keshav School of Computer Science, University of Waterloo, Waterloo, ON, Canada , ABSTRACT We present GAB,

          Add to Reading List

          Source URL: iptps06.cs.ucsb.edu

          Language: English - Date: 2006-02-15 01:41:07
          608

          Hash-flooding DoS reloaded: attacks and defenses Jean-Philippe Aumasson, Kudelski Security (NAGRA) D. J. Bernstein, University of Illinois at Chicago &

          Add to Reading List

          Source URL: www.131002.net

          Language: English - Date: 2012-12-29 19:36:56
            609

            Bacon Corn Hash with Chanterelles http://userealbutter.combacon-corn-hash-chanterelles-recipe/ from Smitten Kitchen 1/2 lb. thick cut bacon, medium dice (1/2 inch) 1 lb. yukon gold potatoes, peeled and medium

            Add to Reading List

            Source URL: jenyu.net

            Language: English - Date: 2015-08-18 12:41:38
              610

              Cryptanalysis of the Round-Reduced Kupyna Hash Function Jian Zou1,2 , Le Dong3 1 Mathematics and Computer Science of Fuzhou University, Fuzhou, China, 350108

              Add to Reading List

              Source URL: eprint.iacr.org

              Language: English - Date: 2015-10-02 05:54:11
                UPDATE