Hashing

Results: 1317



#Item
191

Enhancing Locality Sensitive Hashing with Peek-Probing and Nearest Neighbor Links ∗ Aleksandar Stupar Sebastian Michel

Add to Reading List

Source URL: qid3.mmci.uni-saarland.de

Language: English - Date: 2012-06-11 09:53:16
    192SHA-2

    ØÂЃ (Schvrch) Ðàäå Âó÷êîâàö (Rade Vuckovac, ) 18th February

    Add to Reading List

    Source URL: password-hashing.net

    Language: English - Date: 2014-04-03 12:33:59
      193Cryptocurrencies / Cryptography / Cryptographic hash functions / Error detection and correction / Hashing / Information retrieval / Information science / Digital currencies / Draft:Viccoin:APeer-to-PeerDigital Currency System / Vic coin / Bitcoin network / Merkle tree

      Bitcoin: A Peer-to-Peer Electronic Cash System Satoshi Nakamoto www.bitcoin.org Abstract. A purely peer-to-peer version of electronic cash would allow online

      Add to Reading List

      Source URL: www.weusecoins.com

      Language: English - Date: 2016-06-04 00:10:37
      194Cryptography / Computer security / Computer access control / Cryptographic hash functions / Key management / Password / Security / Salt / Crypt / Passwd / Challengeresponse authentication / Key stretching

      PolyPasswordHasher: Protecting Passwords In The Event Of A Password File Disclosure Justin Cappos Santiago Torres

      Add to Reading List

      Source URL: password-hashing.net

      Language: English - Date: 2014-12-09 05:42:43
      195

      10 years of cryptographic hashing Jean-Philippe Aumasson HASH, x. There is no definition for this word—nobody knows what hash is. Ambrose Bierce, The Devil’s Dictionary

      Add to Reading List

      Source URL: 131002.net

      Language: English - Date: 2012-08-14 06:46:59
        196Cryptography / Cryptographic hash functions / Public-key cryptography / Hashing / Search algorithms / CramerShoup cryptosystem / RSA / ElGamal encryption / Crypt / Hash function / Ciphertext / Universal one-way hash function

        This article is the final version submitted by the authors to the IACR and to Springer-Verlag onThe version published by Springer-Verlag is available at http://dx.doi.orgNew Techn

        Add to Reading List

        Source URL: www.normalesup.org

        Language: English - Date: 2015-02-21 09:51:42
        197Cryptography / Block cipher modes of operation / Disk encryption theory / Advanced Encryption Standard / Padding / Universal hashing / Cipher

        AEZ v4.1: Authenticated Encryption by Enciphering Viet Tung Hoang UC Santa Barbara Ted Krovetz

        Add to Reading List

        Source URL: web.cs.ucdavis.edu

        Language: English - Date: 2015-10-15 15:27:48
        198

        The M AKWA Password Hashing Function Specifications v1.1 Thomas Pornin, <> April 22, 2015 Abstract

        Add to Reading List

        Source URL: www.bolet.org

        Language: English
          199

          Approximate counting by hashing in bounded arithmetic Emil Jeˇr´abek Institute of Mathematics of the Academy of Sciences ˇ a 25, Praha 1, Czech Republic, email: Zitn´

          Add to Reading List

          Source URL: users.math.cas.cz

          Language: English - Date: 2008-11-10 10:52:30
            200Hashing / Search algorithms / Statistical theory / Bloom filter / Bit array / Probability distributions / Hash function / Entropy / Golomb coding / KullbackLeibler divergence / Birthday problem

            CS 493: Algorithms for Massive Data Sets Feb 21, Local Models, Bloom Filter

            Add to Reading List

            Source URL: www.cs.princeton.edu

            Language: English - Date: 2002-03-15 13:15:13
            UPDATE