Hash

Results: 3740



#Item
631Distributed data storage / Computing / Concurrent computing / Distributed computing / Distributed hash table / Chord / Pastry / Peer-to-peer / Routing / Hash table / Anonymous P2P / Peer-to-Peer Protocol

Hashing it out in public Common failure modes of DHT-based anonymity schemes Andrew Tran Nicholas Hopper

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2009-09-02 23:56:34
632Cryptography / Hashing / Error detection and correction / Public-key cryptography / Search algorithms / Digital signature / Cryptographic hash function / Post-quantum cryptography / RSA / Hash function / Merkle tree / MD5

SPHINCS: practical stateless hash-based signatures 1,3 , Daira Hopwood2 , Andreas Hülsing3 , Tanja Lange3 , 3 4 4 Ruben Niederhagen , Louiza Papachristodoulou , Peter Schwabe , and

Add to Reading List

Source URL: cryptojedi.org

Language: English - Date: 2014-10-04 10:08:48
633Cryptography / Computing / Secure communication / Transport Layer Security / Cryptographic protocols / Computer access control / Public key infrastructure / Public-key cryptography / Internet Relay Chat / Key management / Cryptographic hash function / Challengeresponse authentication

SafeSlinger: Easy-to-Use and Secure Public-Key Exchange Michael Farb Yue-Hsun Lin Tiffany Hyun-Jin Kim

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English - Date: 2015-06-01 09:06:14
634

GHT: A Geographic Hash Table for Data-Centric Storage Sylvia Ratnasamy and Brad Karp Li Yin and Fang Yu ICIR/ICSI, Berkeley, CA 94704

Add to Reading List

Source URL: www0.cs.ucl.ac.uk

Language: English - Date: 2003-01-06 13:46:30
    635

    Breakfast – May 26th Eggs Made to Order Buttermilk Pancakes Orange Baguette French Toast Hash Browned Potatoes Turkey Linked Sausage

    Add to Reading List

    Source URL: umw.sodexomyway.com

      636

      Higher Order Universal One-Way Hash Functions? Deukjo Hong1?? , Bart Preneel2 , and Sangjin Lee1? ? ? 1 2

      Add to Reading List

      Source URL: www.iacr.org

      Language: English - Date: 2007-09-06 02:11:54
        637Message authentication codes / CBC-MAC / Block cipher / SHA-1 / Cryptographic hash function / Padding / UMAC / Hash-based message authentication code / Hash function / One-way compression function / Galois/Counter Mode

        A new MAC Construction Alred and a Specific Instance Alpha-MAC Joan Daemen1 and Vincent Rijmen2,3 1 2

        Add to Reading List

        Source URL: jda.noekeon.org

        Language: English - Date: 2013-08-28 07:53:26
        638Bioinformatics / Biology / Academia / Computational biology / Hashing / K-mer / Eulerian path / Bloom filter / Trie / Parallel computing / Hash table / MurmurHash

        Parallel De Bruijn Graph Construction and Traversal for De Novo Genome Assembly Evangelos Georganas†,‡ , Aydın Buluc¸† , Jarrod Chapman∗ Leonid Oliker† , Daniel Rokhsar∗,¶ , Katherine Yelick†,‡ Computa

        Add to Reading List

        Source URL: gauss.cs.ucsb.edu

        Language: English - Date: 2014-09-08 14:12:54
        639Computing / Cryptography / Distributed data storage / File sharing / Software / Secure communication / University of Michigan / Vanish / Distributed hash table / Mainline DHT / BitTorrent / Gmail

        Vanish: Increasing Data Privacy with Self-Destructing Data Roxana Geambasu Tadayoshi Kohno Amit A. Levy

        Add to Reading List

        Source URL: amitlevy.com

        Language: English - Date: 2012-07-22 12:12:57
        640File sharing / Distributed data storage / Distributed hash table / XML databases / Peer-to-peer / Database / Query language / Search engine indexing / EXist

        THESE Présentée en vue d’obtention du grade de DOCTEUR DE L’UNIVERSITE PARIS SUD Discipline : Informatique

        Add to Reading List

        Source URL: pages.saclay.inria.fr

        Language: English - Date: 2012-05-29 09:11:45
        UPDATE