Hashing

Results: 1317



#Item
151Cryptography standards / Message authentication codes / Hashing / Cryptographic hash functions / FIPS 140-2 / Hash-based message authentication code / Linux kernel / Zeroisation / FIPS 140 / Loadable kernel module / Galois/Counter Mode / Block cipher mode of operation

Microsoft Word - 3o - SecurityPolicy_LG_Kernel 8.0.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-07-08 11:48:52
152Search algorithms / Hashing / Hash table / Hash function / Cryptographic hash function / Bin / Trie / Bloom filter / Locality-sensitive hashing

Multiple Aggregations Over Data Streams Rui Zhang† Nick Koudas‡ Beng Chin Ooi†

Add to Reading List

Source URL: www.comp.nus.edu.sg

Language: English - Date: 2005-06-07 05:36:19
153Routing protocols / Public-key cryptography / Hashing / Cryptography / Key management / Border Gateway Protocol / Cryptographic hash function / Hash chain / Merkle tree / RSA / Man-in-the-middle attack / Autonomous system

SPV: Secure Path Vector Routing for Securing BGP ∗ Yih-Chun Hu Adrian Perrig

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English - Date: 2015-06-01 09:06:13
154Search algorithms / Hashing / Hash function / Hash table / Cuckoo hashing / Cryptographic hash function / Birthday problem / Feature hashing / Tabulation hashing

Nordic Collegiate Programming Contest NCPC 2007 October 6th, 2007 The Problemset A B

Add to Reading List

Source URL: ncpc.idi.ntnu.no

Language: English - Date: 2014-01-20 12:10:57
155Hashing / Search algorithms / Bloom filter / Countmin sketch / Hash table / Hash function / Set / Universal hashing / Filter / RabinKarp algorithm / Feature hashing

CS168: The Modern Algorithmic Toolbox Lecture #2: Approximate Heavy Hitters and the Count-Min Sketch Tim Roughgarden & Gregory Valiant∗ March 30, 2016

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2016-06-04 09:49:43
156Cryptocurrencies / Error detection and correction / Hashing / Bitcoin / Cryptographic hash functions / Bitcoin network / Merkle tree / Cryptographic nonce / Hash list / Hash function / Public-key cryptography / Digital signature

Bitcoin: A Peer-to-Peer Electronic Cash System Satoshi Nakamoto www.bitcoin.org Abstract. A purely peer-to-peer version of electronic cash would allow online

Add to Reading List

Source URL: www.dcg.ethz.ch

Language: English - Date: 2014-09-26 08:28:56
157Cryptography / Hashing / Cryptographic hash functions / Search algorithms / Public-key cryptography / Digital signature / EdDSA / Random oracle / Descriptor / Hash function / Advantage

Proving Security of Tor’s Hidden Service Identity Blinding Protocol Tor Project Tech ReportNicholas Hopper 1

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2013-12-12 23:20:54
158Search algorithms / Hashing / Arrays / Quadtree / Grid file / Grid / Hash function / Extendible hashing / Data / Linear hashing / Trie / B-tree

HIERARCHICAL GRID STRUCTURES FOR STATIC GEOGRAPHIC DATA BASES Andreas Kleiner and Kurt E. Brassel Department of Geography University of Zurich Winterthurerstr. 190

Add to Reading List

Source URL: mapcontext.com

Language: English - Date: 2008-08-30 01:13:21
159Fingerprinting algorithms / Hashing / Search algorithms / Locality-sensitive hashing / Hash function / MongoDB / Fingerprint / Chemical similarity / Cryptographic hash function / Acoustic fingerprint / IPython / Public key fingerprint

Michał Nowotka1, Anne Hersey1 [1] European Molecular Biology Laboratory - European Bioinformatics Institute Email: Locality Sensitive Hashing for compound similarity search.

Add to Reading List

Source URL: cisrg.shef.ac.uk

Language: English - Date: 2016-07-11 09:58:32
160

Eve’s SHA3 candidate: malicious hashing Jean-Philippe Aumasson∗ Nagravision SA, Switzerland Abstract. We investigate the definition and construction of hash functions that incorporate a backdoor allowing their design

Add to Reading List

Source URL: 131002.net

Language: English - Date: 2012-08-14 06:46:39
    UPDATE