Hashing

Results: 1317



#Item
101Hashing / Information retrieval / Information science / Search algorithms / Hash table / Hash function / Quadratic probing / Cryptographic hash function / Linear probing / Trie / Double hashing / Hash list

Introduction to Algorithms: 6.006 Massachusetts Institute of Technology Professors Erik Demaine, Piotr Indyk, and Manolis Kellis February 15, 2011 Problem Set 2 Solutions

Add to Reading List

Source URL: courses.csail.mit.edu

Language: English - Date: 2011-03-08 02:53:29
102Information science / Information retrieval / Search algorithms / Hashing / Cuckoo hashing / Hash table / Perfect hash function / Hash function / Linear probing / Randomized algorithm / Big O notation / Double hashing

Backyard Cuckoo Hashing: Constant Worst-Case Operations with a Succinct Representation Yuriy Arbitman∗ Moni Naor†

Add to Reading List

Source URL: www.wisdom.weizmann.ac.il

Language: English - Date: 2010-04-08 04:06:04
103

EWERTON RODRIGUES ANDRADE LYRA2: PASSWORD HASHING SCHEME WITH IMPROVED SECURITY AGAINST TIME-MEMORY TRADE-OFFS LYRA2: UM ESQUEMA DE HASH DE

Add to Reading List

Source URL: lyra2.net

Language: Portuguese - Date: 2016-07-22 14:26:58
    104Information science / Information retrieval / Search algorithms / Hashing / Computer programming / Hash table / Trie / Cuckoo hashing / Bloom filter / Hash function / Database index / Associative array

    SILT: A Memory-Efficient, High-Performance Key-Value Store

    Add to Reading List

    Source URL: www.sigops.org

    Language: English - Date: 2011-09-11 16:39:03
    105Machine learning / Learning / Statistical classification / Artificial intelligence / Dimension reduction / Support vector machine / Random projection

    Ping Li Probabilistic Hashing for Efficient Search and Learning July 12, 2012

    Add to Reading List

    Source URL: mmds-data.org

    Language: English - Date: 2016-03-09 01:30:07
    106Cryptography / Cryptography standards / Cryptographic software / Cryptographic hash functions / Hashing / Microsoft CryptoAPI / FIPS 140-2 / FIPS 140 / Hash-based message authentication code / Critical Security Parameter / Key Wrap / SHA-2

    Hitachi Virtual Storage Platform (VSP) Encryption Board FIPSNon-Proprietary Cryptographic Module Security Policy Version: 4.0 Date: July 27, 2016

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2016-07-27 10:26:48
    107Hashing / Computer programming / Information science / Information retrieval / Finite automata / Trie / Associative arrays / Radix tree / Hash tree / Search algorithms / Hash array mapped trie / Hamming weight

    QP tries are smaller and faster than crit-bit trees Tony Finch University of Cambridge

    Add to Reading List

    Source URL: tinytocs.ece.utexas.edu

    Language: English - Date: 2016-03-05 17:06:25
    108Hashing / Logger / Data logger / Data / Logfile / Hash-based message authentication code / Computer security / Information science / Information retrieval / Cryptography / Trusted computing / Trusted Platform Module

    Continuous Tamper-proof Logging using TPM2.0 Paul England, Limin Jia, James Lorch, and Arunesh Sinha July 9, 2013 (Revised June 16, 2014)

    Add to Reading List

    Source URL: www.andrew.cmu.edu

    Language: English - Date: 2016-01-24 20:37:43
    109Cryptography / Cryptographic hash functions / Information retrieval / Search algorithms / Hashing / Permutations / Error detection and correction / Hash function / Advantage / Birthday attack / Parity of a permutation / One-way compression function

    An earlier version of this paper appeared in EurocryptSecurity/Efficiency Tradeoffs for Permutation-Based Hashing Phillip Rogaway1 and John Steinberger2 1

    Add to Reading List

    Source URL: web.cs.ucdavis.edu

    Language: English - Date: 2008-05-26 20:18:15
    110Distributed data storage / Computing / Computer programming / Software engineering / Distributed hash table / Tapestry / Chord / Consistent hashing / Pastry / Linked list / Node / Trie

    Glacier: Highly durable, decentralized storage despite massive correlated failures∗ Andreas Haeberlen Alan Mislove

    Add to Reading List

    Source URL: www.cs.rice.edu

    Language: English - Date: 2005-05-09 16:29:39
    UPDATE