Hash

Results: 3740



#Item
671Computational complexity theory / Applied mathematics / Cryptography / Mathematics / Message authentication codes / Cryptographic hash functions / VEST

A New Approach to Practical Active-Secure Two-Party Computation 1 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-02-14 09:50:59
672Breakfast foods / Hash browns / Food and drink / Cuisine / American cuisine

Recipe: Veggie Egg Bake ServesPrep time 30 min/ Cook time 60 minutes Ingredients: 12 eggs

Add to Reading List

Source URL: www.sunnysideshlee.com

Language: English - Date: 2015-06-15 12:33:48
673

Lake Macquarie “Sirens” Hash House Harriettes When: Saturday 26th September 2015

Add to Reading List

Source URL: www.hhh.asn.au

- Date: 2015-02-02 22:27:26
    674Breakfast / Hash / Poached egg / Pancake / Muffin / French toast / Granola / Toast / Food and drink / Breakfast foods / Full breakfast

    Microsoft Word - Rise and Shine Weekdaysdoc

    Add to Reading List

    Source URL: www.kahalaresort.com

    Language: English - Date: 2013-08-02 19:59:01
    675Breakfast / Hash / French toast / Fried egg / Danish cuisine / Food and drink / Breakfast foods / Omelette

    Breakfast Menu Egg Whites Available Upon Request EGG DISHES BREAKFAST SPECIALS

    Add to Reading List

    Source URL: thegrill.com

    Language: English - Date: 2014-12-10 11:58:43
    676Random oracle / Relational database management systems / Cross-platform software / Oracle Database / Cryptography / Software / Cryptographic hash functions

    Towards Information-theoretic Security Proofs in EasyCrypt for Multi-party Protocols Alley Stoughton IACR School on Computer-aided Cryptography University of Maryland

    Add to Reading List

    Source URL: www.easycrypt.info

    Language: English - Date: 2015-06-04 11:02:41
    677Diffie–Hellman problem / Full Domain Hash / Rabin signature algorithm / Oracle machine / Optimal asymmetric encryption padding / Digital signature / Schnorr signature / Standard model / RSA / Cryptography / Public-key cryptography / Random oracle

    THE RANDOM ORACLE MODEL: A TWENTY-YEAR RETROSPECTIVE NEAL KOBLITZ AND ALFRED J. MENEZES Abstract. It has been roughly two decades since the random oracle model for reductionist security arguments was introduced and one d

    Add to Reading List

    Source URL: cacr.uwaterloo.ca

    Language: English - Date: 2015-05-02 08:19:13
    678Cryptographic hash function / Hash function / SHA-1 / Tiny Encryption Algorithm / Free60 / Homebrew / Cryptography / Xbox / Search algorithms

    Chapter 11 - Developing Software for the Xbox cheaper than a Powerball ticket. Another approach, related to cracking the RSA-2048 bit key, is to modify an existing, signed Xbox executable in a useful manner without chan

    Add to Reading List

    Source URL: www.xenatera.com

    Language: English - Date: 2003-04-17 04:53:36
    679Concurrent computing / Tapestry / Distributed hash table / Routing / Pastry / Chord / Kademlia / Decentralized object location and routing / Network topology / Distributed data storage / Computing / Network architecture

    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 22, NO. 1, JANUARYTapestry: A Resilient Global-Scale Overlay for Service Deployment

    Add to Reading List

    Source URL: oceanstore.cs.berkeley.edu

    Language: English - Date: 2004-01-29 02:44:42
    680

    Eggs and Omelettes Eggs and Omelettes are served with our Yukon Potato Hash Browns and your choice of Toast Two Eggs Any Style with your Choice of Smoked Country Sausage, Applewood Smoked Ham or Crisp Bacon Carmel Valley

    Add to Reading List

    Source URL: www.schoonersmonterey.com

    Language: English - Date: 2015-07-09 00:31:12
      UPDATE