Hash

Results: 3740



#Item
611Cryptography / Serge Vaudenay / Provable security / Zhang Fangguo / Cryptographic primitive / Willy Susilo / Block cipher / Cryptographic hash function

- Call for papers The Ninth International Conference on Provable Security (ProvSecNovember 24-26, 2015 Kanazawa, Japan Web Page: https://security-lab.jaist.ac.jp/provsec2015/ Contact: t.a

Add to Reading List

Source URL: security-lab.jaist.ac.jp

Language: English - Date: 2015-08-13 01:39:17
612Cryptography / Deterministic encryption / Encryption / Hash function / Bloom filter / Padding / Key

raykova.ccsw_sads [Compatibility Mode]

Add to Reading List

Source URL: digitalpiglet.org

Language: English - Date: 2009-11-28 04:00:03
613Distributed data storage / File sharing / Fault-tolerant computer systems / Peer-to-peer / Computer cluster / Chord / Distributed hash table

On Object Maintenance in Peer-to-Peer Systems Kiran Tati and Geoffrey M. Voelker Department of Computer Science and Engineering University of California, San Diego 1.

Add to Reading List

Source URL: iptps06.cs.ucsb.edu

Language: English - Date: 2006-02-22 21:07:24
614

Sort vs. Hash Revisited: Fast Join Implementation on Modern Multi-Core CPUs Changkyu Kim† Tim Kaldewey⋆ Victor W. Lee†

Add to Reading List

Source URL: pcl.intel-research.net

Language: English - Date: 2014-12-03 02:39:22
    615Mellon / Carnegie Mellon University / Hash function / Carnegie

    Carnegie Mellon University Implementation Tutorial of Parameter Server

    Add to Reading List

    Source URL: www.mlss2014.com

    Language: English - Date: 2014-07-14 11:00:05
    616

    Introduction Hash-based MACs State recovery

    Add to Reading List

    Source URL: www1.spms.ntu.edu.sg

    Language: English
      617

      Introduction HTTM Signature Scheme Cryptanalysis of HTTM Conclusion Cryptanalysis of Hash-based Tamed

      Add to Reading List

      Source URL: pqcrypto2013.xlim.fr

      Language: English - Date: 2013-06-24 09:56:19
        618

        Paper Basket 1. Cut the strips. Turn one newspaper sheet sideways. » Make a hash mark every two inches. » Mark the opposite side in the same way. »

        Add to Reading List

        Source URL: makercamp.com

        Language: English - Date: 2015-07-20 21:34:44
          619

          Linearization and Message Modification Techniques for Hash Function Cryptanalysis

          Add to Reading List

          Source URL: web.spms.ntu.edu.sg

          Language: English
            620

            C:/Documents and Settings/cjiali/My Documents/SPN Hash/Africacrypt2012/SpnHash.dvi

            Add to Reading List

            Source URL: eprint.iacr.org

            Language: English - Date: 2012-07-09 03:32:18
              UPDATE