Hashing

Results: 1317



#Item
101Introduction to Algorithms: 6.006 Massachusetts Institute of Technology Professors Erik Demaine, Piotr Indyk, and Manolis Kellis February 15, 2011 Problem Set 2 Solutions

Introduction to Algorithms: 6.006 Massachusetts Institute of Technology Professors Erik Demaine, Piotr Indyk, and Manolis Kellis February 15, 2011 Problem Set 2 Solutions

Add to Reading List

Source URL: courses.csail.mit.edu

Language: English - Date: 2011-03-08 02:53:29
102Backyard Cuckoo Hashing: Constant Worst-Case Operations with a Succinct Representation Yuriy Arbitman∗ Moni Naor†

Backyard Cuckoo Hashing: Constant Worst-Case Operations with a Succinct Representation Yuriy Arbitman∗ Moni Naor†

Add to Reading List

Source URL: www.wisdom.weizmann.ac.il

Language: English - Date: 2010-04-08 04:06:04
103EWERTON RODRIGUES ANDRADE  LYRA2: PASSWORD HASHING SCHEME WITH IMPROVED SECURITY AGAINST TIME-MEMORY TRADE-OFFS LYRA2: UM ESQUEMA DE HASH DE

EWERTON RODRIGUES ANDRADE LYRA2: PASSWORD HASHING SCHEME WITH IMPROVED SECURITY AGAINST TIME-MEMORY TRADE-OFFS LYRA2: UM ESQUEMA DE HASH DE

Add to Reading List

Source URL: lyra2.net

Language: Portuguese - Date: 2016-07-22 14:26:58
    104SILT: A Memory-Efficient, High-Performance Key-Value Store

    SILT: A Memory-Efficient, High-Performance Key-Value Store

    Add to Reading List

    Source URL: www.sigops.org

    Language: English - Date: 2011-09-11 16:39:03
    105Ping Li  Probabilistic Hashing for Efficient Search and Learning July 12, 2012

    Ping Li Probabilistic Hashing for Efficient Search and Learning July 12, 2012

    Add to Reading List

    Source URL: mmds-data.org

    Language: English - Date: 2016-03-09 01:30:07
    106Hitachi Virtual Storage Platform (VSP) Encryption Board FIPSNon-Proprietary Cryptographic Module Security Policy Version: 4.0 Date: July 27, 2016

    Hitachi Virtual Storage Platform (VSP) Encryption Board FIPSNon-Proprietary Cryptographic Module Security Policy Version: 4.0 Date: July 27, 2016

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2016-07-27 10:26:48
    107QP tries are smaller and faster than crit-bit trees Tony Finch University of Cambridge

    QP tries are smaller and faster than crit-bit trees Tony Finch University of Cambridge

    Add to Reading List

    Source URL: tinytocs.ece.utexas.edu

    Language: English - Date: 2016-03-05 17:06:25
    108Continuous Tamper-proof Logging using TPM2.0 Paul England, Limin Jia, James Lorch, and Arunesh Sinha July 9, 2013 (Revised June 16, 2014)

    Continuous Tamper-proof Logging using TPM2.0 Paul England, Limin Jia, James Lorch, and Arunesh Sinha July 9, 2013 (Revised June 16, 2014)

    Add to Reading List

    Source URL: www.andrew.cmu.edu

    Language: English - Date: 2016-01-24 20:37:43
    109An earlier version of this paper appeared in EurocryptSecurity/Efficiency Tradeoffs for Permutation-Based Hashing Phillip Rogaway1 and John Steinberger2 1

    An earlier version of this paper appeared in EurocryptSecurity/Efficiency Tradeoffs for Permutation-Based Hashing Phillip Rogaway1 and John Steinberger2 1

    Add to Reading List

    Source URL: web.cs.ucdavis.edu

    Language: English - Date: 2008-05-26 20:18:15
    110Glacier: Highly durable, decentralized storage despite massive correlated failures∗ Andreas Haeberlen Alan Mislove

    Glacier: Highly durable, decentralized storage despite massive correlated failures∗ Andreas Haeberlen Alan Mislove

    Add to Reading List

    Source URL: www.cs.rice.edu

    Language: English - Date: 2005-05-09 16:29:39