Hash

Results: 3740



#Item
621Cryptography / Cryptographic protocols / Public-key cryptography / Search algorithms / Elliptic Curve Digital Signature Algorithm / Elliptic curve cryptography / Hash function / X.509 / SHA-2

RFC6962-bis update ● ● Some tweaking still needed. Last call should wait for our implementation.

Add to Reading List

Source URL: www.ietf.org

Language: English - Date: 2015-07-23 10:29:05
622Cryptography / Information retrieval / Search algorithms / Information science / Cryptographic hash functions / Hashing / Error detection and correction / Hash table / SHA-1 / Version vector / Hash function / Euclidean vector

Appears in Proceedings of the 23rd IEEE International Conference on Distributed Computing Systems (ICDCS ’03). The Hash History Approach for Reconciling Mutual Inconsistency Brent ByungHoon Kang, Robert Wilensky and J

Add to Reading List

Source URL: www.oceanstore.org

Language: English - Date: 2003-03-13 15:50:35
623Algebra / Mathematics / Computing / Functional analysis / Linear algebra / Kernel / Matrices / Numerical linear algebra / Email spam / Group representation / Spamming

Hash Kernels & Linear Models Vector Space Model for Text f (x) = hw, xi + b = i

Add to Reading List

Source URL: www.mlss2014.com

Language: English - Date: 2014-07-10 12:00:20
624Search algorithms / Hashing / Dimension reduction / Locality-sensitive hashing / Error detection and correction / Hash function / Relevance / Recommender system / K-nearest neighbors algorithm

Real-Time Recommendation of Diverse Related Articles Sofiane Abbar Sihem Amer-Yahia Piotr Indyk

Add to Reading List

Source URL: www2013.wwwconference.org

Language: English - Date: 2014-07-21 08:47:06
625

The PHOTON Family of Lightweight Hash Functions Jian Guo1 , Thomas Peyrin?2 , and Axel Poschmann?2 1 Institute for Infocomm Research, Singapore Nanyang Technological University, Singapore

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-10-29 11:39:10
    626Distributed data storage / Computing / Internet / Network architecture / Distributed hash table / Tapestry / Peer-to-peer / Pastry / Routing / Chord / Anycast / IP hijacking

    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 20, NO. 10,

    Add to Reading List

    Source URL: www.cs.ucsb.edu

    Language: English - Date: 2009-10-12 23:36:22
    627

    Hacking Sucks! Why hash makes the hurting stop the grugq <> Agenda Why Hacking Sucks

    Add to Reading List

    Source URL: powerofcommunity.net

    Language: English - Date: 2007-11-10 01:56:12
      628

      GlobecomCommunication and Information System Security Symposium Secure and Efficient Constructions of Hash, MAC and PRF for Mobile Devices Yan Zhu, Shanbiao Wang

      Add to Reading List

      Source URL: sefcom.asu.edu

      Language: English - Date: 2014-11-20 12:03:43
        629

        1 Single Core Implementation of Blue Midnight Wish Hash Function on VIRTEX 5 Platform Mohamed El Hadedy1,2 , Danilo Gligoroski3 and Svein J. Knapskog

        Add to Reading List

        Source URL: people.item.ntnu.no

        Language: English - Date: 2010-11-02 08:23:10
          630Software testing / Search algorithms / Theoretical computer science / Fuzz testing / Hash function / Algorithm / Mathematical optimization / Software bug / Information retrieval / Software engineering / Mathematics

          Dynamic Test Generation for Large Binary Programs by David Alexander Molnar A.B. (Harvard CollegeM.S. (University of California, Berkeley) 2006

          Add to Reading List

          Source URL: www.dmolnar.com

          Language: English - Date: 2009-08-16 21:04:01
          UPDATE