Hash

Results: 3740



#Item
791Database management systems / Concurrency control / Databases / Extensible Storage Engine / Database index / Database / Lock / Hash table / Lookup table / Data management / Computing / Data

Just-in-time Index Reference Updates Chendong Zou 921 S.W. Washington Ave, Suite 670 Portland, OR97205

Add to Reading List

Source URL: hpts.ws

Language: English - Date: 2012-04-19 12:03:21
792Cryptographic protocol / ASP.NET / Cryptographic hash function / Symmetric-key algorithm / Computer security / Key / Cryptography / Security / Cryptographic primitive

SECURITY DRIVEN .NET .NET/ASP.NET 4.5 STAN DRAPKIN. OCTOBER 2013. SECURITY DRIVEN .NET

Add to Reading List

Source URL: securitydriven.net

Language: English - Date: 2015-04-04 22:36:18
793Search algorithms / Modular arithmetic / Exponentials / Exponentiation by squaring / Montgomery reduction / Hash function / 64-bit / Euclidean vector / Mathematics / Algebra / Computer arithmetic

Optimizing M AKWA on GPU and CPU Thomas Pornin, <> May 18, 2015 Abstract We present here optimized implementations of the M AKWA password hashing

Add to Reading List

Source URL: www.bolet.org

Language: English - Date: 2015-05-18 18:18:01
794Bitcoin / Peer-to-peer computing / Payment systems / Financial cryptography / Cryptographic hash functions / Cryptography / Software / Computing

ISSCCIICT 2014, Limerick, June 26–27 Bitcoin Mining and its Energy Footprint Karl J. O’Dwyer† and David Malone∗ Hamilton Institute National University of Ireland Maynooth

Add to Reading List

Source URL: karlodwyer.github.io

Language: English - Date: 2014-06-25 06:07:20
795Search algorithms / Cryptographic hash functions / Analysis of algorithms / Probabilistic complexity theory / Randomized algorithm / PP / Algorithm / Hash function / Universal hashing / Theoretical computer science / Applied mathematics / Computational complexity theory

A Scalable and Nearly Uniform Generator of SAT Witnesses? Supratik Chakraborty1 , Kuldeep S. Meel2 , and Moshe Y. Vardi2 1 2

Add to Reading List

Source URL: www.cs.rice.edu

Language: English - Date: 2013-07-17 18:10:56
796Cryptographic hash functions / The quick brown fox jumps over the lazy dog / Typography / Lazy Dog

Microsoft Word - eiss_template_en.docx

Add to Reading List

Source URL: www.gakkai-web.net

Language: English - Date: 2015-05-11 21:25:37
797

Hvis du deltager og ikke trækker  CapOpus­behandlingen  Alle vil deltage i 3 forskningsinterview, hvor  de vil få mulighed for at tale om deres  oplevelser med hash og psykose.   Du vil 

Add to Reading List

Source URL: www.capopus.dk

Language: Danish - Date: 2009-09-13 12:12:24
    798Cryptographic hash functions / Hashing / Advanced Encryption Standard / Cryptographic Module Validation Program / FIPS 140-2 / OpenSSL / Open Source Software Institute / SHA-2 / FIPS 140 / Cryptography / Cryptography standards / Cryptographic software

    OpenSSL FIPS Object Module VersionBy the Open Source Software Institute http://www.oss-institute.org/

    Add to Reading List

    Source URL: openssl.org

    Language: English - Date: 2007-12-13 15:11:03
    799

    Hash List Hash List Hash Liste (Fingerprints) für DLS (Stand: )

    Add to Reading List

    Source URL: www.bmvit.gv.at

    Language: English - Date: 2015-03-20 05:46:22
      800Eggs Benedict / French toast / Bacon ice cream / Hash / Toast / Pancake / Breakfast sandwich / Full breakfast / Food and drink / Breakfast foods / Breakfast

      Breakfast Buffet Continental $7.95 An assortment of fresh fruit, yogurt, fresh baked pastries and breakfast breads, cold cereal, granola, steel cut oats, and coffee, tea or milk.

      Add to Reading List

      Source URL: www.lutsenresort.com

      Language: English - Date: 2014-11-06 21:26:22
      UPDATE