Hash

Results: 3740



#Item
821RSA / Random oracle / Optimal asymmetric encryption padding / Digital signature / Strong RSA assumption / Cryptographic hash function / Index of cryptography articles / Lamport signature / Cryptography / Public-key cryptography / Full Domain Hash

On the Instantiability of Hash-and-Sign RSA Signatures Yevgeniy Dodis1 , Iftach Haitner2⋆ , and Aris Tentes1 1 2

Add to Reading List

Source URL: www.cs.tau.ac.il

Language: English - Date: 2013-06-11 04:12:51
822Pancake / French toast / Omelette / Hash / Sausage gravy / Gluten-free diet / Full breakfast / Breakfast sandwich / Food and drink / Breakfast foods / Breakfast

Fresh Starts The Sunrise ............................................................................................................................................................................. 9.00 Teton granola wi

Add to Reading List

Source URL: www.gtlc.com

Language: English - Date: 2014-05-23 17:46:22
823Cut / Lazy Dog / Fox Broadcasting Company / Cryptographic hash functions / FILe Generator and Editor / The quick brown fox jumps over the lazy dog / Typography / Computing

The AMERICAN ASSOCIATION OF

Add to Reading List

Source URL: aai.org

Language: English - Date: 2015-05-26 11:03:06
824Pancake / Breakfast / French toast / Hash / Toast / Home fries / Full breakfast / Bacon /  egg and cheese sandwich / Food and drink / Breakfast foods / Breakfast sandwich

825 Lakeside Farms Breakfast Menu.indd

Add to Reading List

Source URL: www.lakesidefarmscidermill.com

Language: English - Date: 2015-04-28 20:41:14
825Checksum / NTFS / Information science / Computing / Hashing / Information retrieval / Cryptography / Search algorithms / Error detection and correction / Hash function

Jim  Lyle   National  Institute  of  Standards  and  Technology   Disclaimer    Certain  trade  names  and  company  products  are   mentioned  in  the  text

Add to Reading List

Source URL: www.cftt.nist.gov

Language: English - Date: 2010-09-16 15:17:26
826RSA / Optimal asymmetric encryption padding / Denotational semantics / ElGamal encryption / Cryptographic hash function / Random oracle / XTR / Function / Digital signature / Cryptography / Public-key cryptography / Ciphertext indistinguishability

Formal certification of ElGamal encryption A gentle introduction to CertiCrypt ⋆ Gilles Barthe1 , Benjamin Gr´egoire2,3, Sylvain Heraud3 , and

Add to Reading List

Source URL: software.imdea.org

Language: English - Date: 2013-03-13 12:33:24
827Finite fields / Information theory / Information / Computing / Mathematics / Network coding / Cryptographic hash function / Hash function / One-way function / Hashing / Cryptography / Coding theory

On the Practical and Security Issues of Batch Content Distribution Via Network Coding Qiming Li Dah-Ming Chiu John C.S. Lui Computer & Information Science Dept

Add to Reading List

Source URL: www.cs.cuhk.hk

Language: English - Date: 2006-08-26 01:38:18
828Hash / Full breakfast / Food and drink / Breakfast foods / British cuisine

PDF Document

Add to Reading List

Source URL: media.wix.com

Language: English - Date: 2014-10-28 14:22:00
829Distributed data storage / BitTorrent / File sharing networks / Cross-platform software / Web 2.0 / Vanish / Distributed hash table / Peer-to-peer / Vuze / Computing / Software / Cryptography

Vanish: Increasing Data Privacy with Self-Destructing Data Roxana Geambasu Tadayoshi Kohno Amit A. Levy

Add to Reading List

Source URL: www.amitlevy.com

Language: English - Date: 2012-07-22 12:12:57
830Distributed hash table / Chord / Kademlia / Tapestry / Pastry / Connectivity / Peer-to-peer / Distributed data storage / Computing / Koorde

D2B: a de Bruijn Based Content-Addressable Network ⋆ Pierre Fraigniaud ∗,1 CNRS Laboratoire de Recherche en Informatique (LRI) Universit´e Paris-Sud, 91405 Orsay, France.

Add to Reading List

Source URL: www.liafa.jussieu.fr

Language: English - Date: 2007-01-17 10:04:32
UPDATE