Hashing

Results: 1317



#Item
321Search algorithms / Modular arithmetic / Exponentials / Exponentiation by squaring / Montgomery reduction / Hash function / 64-bit / Euclidean vector / Mathematics / Algebra / Computer arithmetic

Optimizing M AKWA on GPU and CPU Thomas Pornin, <> May 18, 2015 Abstract We present here optimized implementations of the M AKWA password hashing

Add to Reading List

Source URL: www.bolet.org

Language: English - Date: 2015-05-18 18:18:01
322Search algorithms / Cryptographic hash functions / Analysis of algorithms / Probabilistic complexity theory / Randomized algorithm / PP / Algorithm / Hash function / Universal hashing / Theoretical computer science / Applied mathematics / Computational complexity theory

A Scalable and Nearly Uniform Generator of SAT Witnesses? Supratik Chakraborty1 , Kuldeep S. Meel2 , and Moshe Y. Vardi2 1 2

Add to Reading List

Source URL: www.cs.rice.edu

Language: English - Date: 2013-07-17 18:10:56
323Cryptographic hash functions / Hashing / Advanced Encryption Standard / Cryptographic Module Validation Program / FIPS 140-2 / OpenSSL / Open Source Software Institute / SHA-2 / FIPS 140 / Cryptography / Cryptography standards / Cryptographic software

OpenSSL FIPS Object Module VersionBy the Open Source Software Institute http://www.oss-institute.org/

Add to Reading List

Source URL: openssl.org

Language: English - Date: 2007-12-13 15:11:03
324Hashing / MD5 / HMAC / SHA-2 / Collision attack / SHA-1 / Hash function / Crypt / Merkle–Damgård construction / Error detection and correction / Cryptographic hash functions / Cryptography

EECS 388 Intro to Computer Security September 5, 2014 Project 1: Attacking Cryptographic Hashes

Add to Reading List

Source URL: www.eecs.umich.edu

Language: English - Date: 2014-12-24 15:06:41
325Information science / Artificial intelligence / Hash table / Hash function / Linear probing / Cuckoo hashing / Double hashing / Perfect hash function / Quadratic probing / Search algorithms / Hashing / Information retrieval

Cache-Oblivious Hashing∗ Rasmus Pagh IT University of Copenhagen Copenhagen, Denmark

Add to Reading List

Source URL: www.cse.ust.hk

Language: English - Date: 2010-04-07 23:39:13
326Applied mathematics / Search algorithms / Hashing / Computational complexity theory / Pseudorandom function family / Pseudorandom generator / Hash function / Cuckoo hashing / One-way function / Theoretical computer science / Mathematics / Pseudorandomness

Hardness Preserving Reductions via Cuckoo Hashing Itay Berman∗ Iftach Haitner∗ Ilan Komargodski†

Add to Reading List

Source URL: www.cs.tau.ac.il

Language: English - Date: 2013-06-11 04:11:57
327Analytic number theory / Elliptic curve / Group theory / Mathematics / Hash function / Cryptographic hash function / Information retrieval / Artificial intelligence / Boneh/Franklin scheme / Cryptography / Search algorithms / Hashing

Introduction Related Works Proposal Hashing Conclusion How to Hash into Elliptic Curves Thomas Icart

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2009-10-23 17:02:32
328Search algorithms / Ciphertext indistinguishability / Random oracle / Advantage / Hash function / ElGamal encryption / One-way function / Optimal asymmetric encryption padding / Probabilistic encryption / Cryptography / Cryptographic hash functions / Hashing

CS276 Cryptography Spring 2006 Lecture 19: Lecturer: David Wagner

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:43
329Mathematics / Locality-sensitive hashing / Nearest neighbor search / Hash function / Speech recognition / Hash table / K-nearest neighbor algorithm / K-d tree / Information retrieval / Search algorithms / Information science / Artificial intelligence

LARGE-SCALE SPEAKER IDENTIFICATION Ludwig Schmidt∗ Matthew Sharifi and Ignacio Lopez Moreno MIT

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2015-05-25 21:19:32
330Checksum / NTFS / Information science / Computing / Hashing / Information retrieval / Cryptography / Search algorithms / Error detection and correction / Hash function

Jim  Lyle   National  Institute  of  Standards  and  Technology   Disclaimer    Certain  trade  names  and  company  products  are   mentioned  in  the  text

Add to Reading List

Source URL: www.cftt.nist.gov

Language: English - Date: 2010-09-16 15:17:26
UPDATE