<--- Back to Details
First PageDocument Content
Keccak / NIST hash function competition / SHA-2 / Preimage attack / Merkle–Damgård construction / Crypt / Hash tree / SHA-1 / Secure Hash Standard / Cryptographic hash functions / Error detection and correction / Cryptography
Date: 2014-08-22 14:11:37
Keccak
NIST hash function competition
SHA-2
Preimage attack
Merkle–Damgård construction
Crypt
Hash tree
SHA-1
Secure Hash Standard
Cryptographic hash functions
Error detection and correction
Cryptography

SHA-3 Standard: Overview, Status, Public Comment

Add to Reading List

Source URL: csrc.nist.gov

Download Document from Source Website

File Size: 174,33 KB

Share Document on Facebook

Similar Documents

Distributed data storage / Computing / Computer programming / Concurrent computing / Trie / Prefix hash tree / Cache / Chord / Peer-to-peer / Hash table / Distributed hash table / Kademlia

Cooperative XPath Caching Kostas Lillis and Evaggelia Pitoura Computer Science Department University of Ioannina, Greece {klillis,

DocID: 1rqvV - View Document

Distributed data storage / Computing / Concurrent computing / Distributed computing / Distributed hash table / Chord / Koorde / Gnutella / Peer-to-peer / Overlay network / Routing / Prefix hash tree

The Architecture of PIER: an Internet-Scale Query Processor Ryan Huebsch, Brent Chun, Joseph M. Hellerstein, Boon Thau Loo, Petros Maniatis, Timothy Roscoe, Scott Shenker, Ion Stoica and Aydan R. Yumerefendi UC Berkeley

DocID: 1r0TY - View Document

Computing / Search algorithms / Information retrieval / Information science / B-tree / Arrays / Hash table / B+ tree / Database index / Trie / Hash function / Extensible Storage Engine

Microsoft Word - article4.doc

DocID: 1qZW6 - View Document

Distributed data storage / Computing / Computer programming / Graph theory / BATON Overlay / Tapestry / B-tree / Pastry / Distributed hash table / Chord / Tree / Binary tree

BATON: A Balanced Tree Structure for Peer-to-Peer Networks H.V. Jagadish 1,2

DocID: 1qq4a - View Document

Computer programming / Distributed data storage / Computing / Software engineering / Routing algorithms / Chord / Distributed hash table / Flooding / Distributed computing / B-tree / Tree traversal / Kademlia

1242 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 17,

DocID: 1qadb - View Document