Hash function

Results: 1800



#Item
1Search algorithms / Information retrieval / Information science / Cryptography / Hashing / Cryptographic hash functions / Error detection and correction / Hash function / Hash table / Hopf decomposition / Compound of twelve pentagonal antiprisms with rotational freedom

Time-memory Trade-offs for Near-collisions Ga¨etan Leurent UCL Crypto Group Abstract. In this work we consider generic algorithms to find nearcollisions for a hash function. If we consider o

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:40
2Cryptography / Cryptographic hash functions / Error detection and correction / Streebog / GOST / Preimage attack / SHA-3 / MD5 / SHA-2 / SHA-1 / Hash function / BLAKE

The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function Jian Guo1 , J´er´emy Jean1 , Ga¨etan Leurent2 , Thomas Peyrin1 , and Lei Wang1 1

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:34
3

The Skein Hash Function Family Version 1.3 — 1 Oct 2010 Niels Ferguson Stefan Lucks Bruce Schneier

Add to Reading List

Source URL: www.schneier.com

- Date: 2015-12-10 18:36:29
    4

    On the design and cryptanalysis of a one-way hash Carl Ellison Victor Miller Eran Tromer Rebecca Wright In this paper we describe a novel one-way hash function that is compliant with the NIST hash function competition dr

    Add to Reading List

    Source URL: www.anagram.com

    - Date: 2010-11-11 14:43:00
      5

      Appears in Fast Software Encryption(FSE 2004), Lecture Notes in Computer Science, Vol. ????, Springer-Verlag. This is the full version. Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for P

      Add to Reading List

      Source URL: web.cs.ucdavis.edu

      - Date: 2004-02-12 14:18:41
        6Computing / Computer programming / Parallel computing / Software engineering / Application programming interfaces / Message Passing Interface / MPICH / Hash function / Computer cluster / Collective operation / Lis

        Collective Error Detection for MPI Collective Operations? Chris Falzone University of Pennsylvania at Edinboro Edinboro, PennsylvaniaAnthony Chan, Ewing Lusk, and William Gropp

        Add to Reading List

        Source URL: wgropp.cs.illinois.edu

        Language: English - Date: 2016-08-16 11:52:12
        7Search algorithms / Abstract data types / Computing / Software engineering / Computer programming / Arrays / Hash table / Set / Stack / Hash function / Operator / Andries

        Why   Learn   About   Data   Structures?   (1/2) Why   Learn   About   Data   Structures?   (2/2) • They  are  c entral  to  CS16:    Algorithms  and  Data  Structures

        Add to Reading List

        Source URL: cs.brown.edu

        Language: English - Date: 2015-11-12 14:10:30
        8Software / System software / Cryptography / Antivirus software / Clam AntiVirus / Bloom filter / Computer virus / Malware / Digital signature / MD5 / Hash function

        JOURNAL OF COMMUNICATIONS AND NETWORKS, VOL. 13, NO. 2, APRILSplitScreen: Enabling Efficient, Distributed Malware Detection

        Add to Reading List

        Source URL: users.ece.cmu.edu

        Language: English - Date: 2014-05-29 15:38:01
        9Information science / Information retrieval / Hashing / Countmin sketch / Recommender system / MinHash / K-nearest neighbors algorithm / Feature hashing / Cryptographic hash function / Collaborative filtering

        POIsketch: Semantic Place Labeling over User Activity Streams 1 Dingqi Yang1 , Bin Li2 , Philippe Cudr´e-Mauroux1 eXascale Infolab, University of Fribourg, 1700 Fribourg, Switzerland 2

        Add to Reading List

        Source URL: exascale.info

        Language: English - Date: 2016-08-17 10:09:29
        UPDATE