Hashing

Results: 1317



#Item
251Cryptography / Cryptographic hash functions / Hashing / Error detection and correction / Universal one-way hash function / Preimage attack / Collision resistance / Hash function / Hash list / SHA-3 / One-way compression function

Introduction MD New Results I

Add to Reading List

Source URL: www.hyperelliptic.org

Language: English - Date: 2008-09-27 14:59:29
252Cryptography / Cryptographic hash functions / Search algorithms / Hashing / Revenue stamps / Error detection and correction / Hash function / Digital signature / Universal one-way hash function / Claw-free permutation / E-stamping

How to Time-Stamp a Digital Document Stuart Haber W. Scott Stornetta

Add to Reading List

Source URL: www.anf.es

Language: English - Date: 2014-05-12 07:16:17
253

Hashing Functions can Simplify Zero-Knowledge Protocol Design (too) Ivan Damgard Oded Goldreichy

Add to Reading List

Source URL: www.wisdom.weizmann.ac.il

Language: English - Date: 2014-06-22 06:26:11
    254

    Universal Hashing for Ultra-Low-Power Cryptographic Hardware Applications by Kaan Y¨ uksel

    Add to Reading List

    Source URL: www.wpi.edu

    Language: English - Date: 2004-04-28 19:59:50
      255

      Hashing-Based Approximate Probabilistic Inference in Hybrid Domains Vaishak Belle Dept. of Computer Science KU Leuven Belgium

      Add to Reading List

      Source URL: lirias.kuleuven.be

      Language: English - Date: 2016-02-10 05:13:38
        256

        Spectral Hashing 3 Yair Weiss1,3 School of Computer Science,

        Add to Reading List

        Source URL: rogerioferis.com

        Language: English - Date: 2014-01-19 16:50:43
          257Cryptography / Information retrieval / Search algorithms / Information science / Cryptographic hash functions / Hashing / Error detection and correction / Hash table / SHA-1 / Version vector / Hash function / Euclidean vector

          Appears in Proceedings of the 23rd IEEE International Conference on Distributed Computing Systems (ICDCS ’03). The Hash History Approach for Reconciling Mutual Inconsistency Brent ByungHoon Kang, Robert Wilensky and J

          Add to Reading List

          Source URL: www.oceanstore.org

          Language: English - Date: 2003-03-13 15:50:35
          258

          Beyond Locality-Sensitive Hashing Alexandr Andoni (Microsoft Research), Piotr Indyk (MIT), Huy L. Nguyen (Princeton) and Ilya Razenshteyn (MIT) (Approximate) Near Neighbor Problem ((A)NN) The main approach: data-depende

          Add to Reading List

          Source URL: ilyaraz.org

          Language: English - Date: 2014-04-21 21:52:06
            259

            Parallel Hashing via List Recoverability⋆ Iftach Haitner1 , Yuval Ishai2 , Eran Omri3 , and Ronen Shaltiel4 1 Tel Aviv University, Tel Aviv, Israel,

            Add to Reading List

            Source URL: www.cs.tau.ac.il

            Language: English - Date: 2015-06-07 02:20:16
              260Search algorithms / Hashing / Dimension reduction / Locality-sensitive hashing / Error detection and correction / Hash function / Relevance / Recommender system / K-nearest neighbors algorithm

              Real-Time Recommendation of Diverse Related Articles Sofiane Abbar Sihem Amer-Yahia Piotr Indyk

              Add to Reading List

              Source URL: www2013.wwwconference.org

              Language: English - Date: 2014-07-21 08:47:06
              UPDATE