Hash

Results: 3740



#Item
911Combinatorics / Cryptography / Search algorithms / Applied mathematics / SHA-2 / Theoretical computer science / Permutation / Hash function / Independence / Mathematics / Cryptographic hash functions / Hashing

i A random zoo: sloth, un∨corn, and trx Arjen K. Lenstra and Benjamin Wesolowski EPFL IC LACAL, Station 14, CH-1015 Lausanne, Switzerland Abstract. Many applications require trustworthy generation of public random num

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-22 06:51:37
912NSD / Search algorithms / Unbound / Tcpdump / Name server / Hash function / Software / System software / Domain name system

NSEC3 Hash Performance Yuri Schaeffer Matthijs Mekking http://www.nlnetlabs.nl/

Add to Reading List

Source URL: nlnetlabs.nl

Language: English - Date: 2010-03-30 09:29:56
913Distributed hash table / Chord / Peer-to-peer / Hash table / Prefix hash tree / Lookup table / PlanetLab / Trie / Kademlia / Distributed data storage / Computing / Computer programming

OpenDHT: A Public DHT Service and Its Uses Sean Rhea, Brighten Godfrey, Brad Karp, John Kubiatowicz, Sylvia Ratnasamy, Scott Shenker, Ion Stoica, and Harlan Yu UC Berkeley and Intel Research

Add to Reading List

Source URL: www.eecs.berkeley.edu

Language: English - Date: 2005-06-20 16:13:06
914MD5 / Search algorithms / Collision attack / MD4 / Hash function / Merkle–Damgård construction / Preimage attack / Crypt / SHA-1 / Cryptography / Cryptographic hash functions / Hashing

An algorithm for MD5 single-block collision attack using high-performance computing cluster

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-11-07 01:57:01
915Distributed computing / Distributed hash table / Peer-to-peer / Tapestry / Chord / Koorde / Kademlia / Social peer-to-peer processes / Pastry / Distributed data storage / Concurrent computing / Computing

152 Chapter 14 Peer-to-Peer Computing “Indeed, I believe that virtually every important aspect of

Add to Reading List

Source URL: dcg.ethz.ch

Language: English - Date: 2014-09-26 08:28:47
916Data management / Search algorithms / Information / Security / Cryptography / Digital watermarking / Database / Relational database / Hash function / Watermarking / Database theory / Database management systems

Database Forensics in the Service of Information Accountability Kyriacos E. Pavlou Department of Computer Science The University of Arizona P.O. Box

Add to Reading List

Source URL: www.cs.arizona.edu

Language: English - Date: 2011-11-15 03:32:08
917Wireless networking / Routing / Wireless sensor network / Node / Trie / Network topology / Anycast / Hash table / Network architecture / Computing / Internet

Rendezvous Regions: A Scalable Architecture for Service Location and Data-Centric Storage in Large-Scale Wireless Networks Karim Seada, Ahmed Helmy Electrical Engineering Department, University of Southern California {se

Add to Reading List

Source URL: www.dsm.fordham.edu

Language: English - Date: 2007-03-10 14:28:30
918Distributed computing / Peer-to-peer / Chord / Distributed hash table / P-Grid / Pastry / Scalability / Gnutella / Hash list / Distributed data storage / Concurrent computing / Computing

The MINERVA∗ Project: Database Selection in the Context of P2P Search Matthias Bender, Sebastian Michel, Gerhard Weikum, Christian Zimmer {mbender, smichel, weikum, czimmer}@mpi-sb.mpg.de Max-Planck-Institut f¨ur Info

Add to Reading List

Source URL: subs.emis.de

Language: English - Date: 2013-10-04 10:30:31
919Error detection and correction / Search algorithms / Data synchronization / Rsync / Cryptographic hash functions / Hashing / Transmission Control Protocol / Checksum / Sum / Computing / Data / System software

Int. J. Communications, Network and System Sciences, 2013, 6, 37-51 doi:ijcnsPublished Online Januaryhttp://www.scirp.org/journal/ijcns) Scalable Incremental Network Programming for Multihop Wi

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2013-02-07 00:17:36
920Kademlia / Pastry / Peer-to-peer / Tapestry / Chord / Coral Content Distribution Network / Gnutella / Tulip Overlay / Koorde / Distributed data storage / Computing / Distributed hash table

Sloppy hashing and self-organizing clusters Michael J. Freedman and David Mazi`eres NYU Dept of Computer Science {mfreed,dm}@cs.nyu.edu http://www.scs.cs.nyu.edu/coral/ Abstract

Add to Reading List

Source URL: coralcdn.org

Language: English - Date: 2003-02-09 22:19:00
UPDATE