Hashing

Results: 1317



#Item
331Functions and mappings / Model theory / Digital signal processing / Dirac delta function / Fourier analysis / Interpretation / Characteristic function / Distribution / Function / Mathematical analysis / Mathematics / Generalized functions

Verified Indifferentiable Hashing into Elliptic Curves Gilles Barthe1 , Benjamin Gr´egoire2 , Sylvain Heraud2 , Federico Olmedo1, and Santiago Zanella-B´eguelin3 1

Add to Reading List

Source URL: certicrypt.gforge.inria.fr

Language: English - Date: 2013-06-18 05:09:59
332Finite fields / Information theory / Information / Computing / Mathematics / Network coding / Cryptographic hash function / Hash function / One-way function / Hashing / Cryptography / Coding theory

On the Practical and Security Issues of Batch Content Distribution Via Network Coding Qiming Li Dah-Ming Chiu John C.S. Lui Computer & Information Science Dept

Add to Reading List

Source URL: www.cs.cuhk.hk

Language: English - Date: 2006-08-26 01:38:18
333Hashing / FIPS 140-2 / HMAC / Microsoft CryptoAPI / Advanced Encryption Standard / Critical Security Parameter / FIPS 140 / SHA-2 / Key Wrap / Cryptography / Cryptographic software / Cryptography standards

HP XP7 Encryption Ready Disk Adapter (eDKA) Level1 FIPSNon-Proprietary Cryptographic Module Security Policy Version: 1.7 Date: May 13, 2015

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-05-22 08:09:52
334NoSQL / Structured storage / Search algorithms / Distributed computing architecture / Database management system / MongoDB / Consistent hashing / Hyperspace / Distributed hash table / Data management / Data / Computing

HyperDex: A Distributed, Searchable Key-Value Store Robert Escriva Bernard Wong Emin Gün Sirer

Add to Reading List

Source URL: hyperdex.org

Language: English - Date: 2013-09-30 21:44:12
335Information science / Computer performance / Hashing / Computer memory / Non-volatile memory / Solid-state drive / Hash table / IOPS / Bloom filter / Computing / Search algorithms / Computer hardware

Design Patterns for Tunable and Efficient SSD-based Indexes Ashok Anand† , Aaron Gember-Jacobson*, Collin Engstrom*, Aditya Akella* † Instart Logic *University of Wisconsin-Madison †

Add to Reading List

Source URL: agember.com

Language: English - Date: 2014-10-21 17:08:21
336Pavements / HMAC / Hashing / Geography of California / Staple / Concrete / Alameda /  California / Visual arts / Construction / Building materials

Bond 2012 Update Council Briefing February 17, 2015 1 Bond 2012 Update

Add to Reading List

Source URL: engineercc.com

Language: English - Date: 2015-02-18 09:49:25
337Hashing / Cryptographic hash functions / Advanced Encryption Standard / HMAC / FIPS 140-2 / SHA-2 / SHA-1 / FIPS 140 / OpenSSL / Cryptography / Cryptography standards / Cryptographic software

Microsoft Word - Brocade_Security_Policy_FOSv721 (Brocade_13.10.29_V1.1).docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-05-21 15:50:50
338Information / Hashing / World Wide Web / Data / Error detection and correction / Resource / Named graph / Hash list / RDFLib / Semantic Web / Cryptographic hash functions / Computing

Trusty URIs: Verifiable, Immutable, and Permanent Digital Artifacts for Linked Data Tobias Kuhn1 and Michel Dumontier2 1 arXiv:1401.5775v3 [cs.CR] 28 May 2014

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2014-05-28 22:07:51
339Peer-to-peer computing / Cryptography / Payment systems / Financial cryptography / Hashing / Computing / Software / Bitcoin

SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies Joseph Bonneau∗†‡ , Andrew Miller§ , Jeremy Clark¶ , Arvind Narayanan∗ , Joshua A. Kroll∗ , Edward W. Felten∗ University, † Stan

Add to Reading List

Source URL: www.cs.princeton.edu

Language: English - Date: 2015-03-23 16:23:28
340Mathematics / Elliptic curve cryptography / Elliptic curve / Boneh/Franklin scheme / ID-based encryption / Pairing / Homomorphic signatures for network coding / BLS / Cryptography / Abstract algebra / Algebra

Verified Indifferentiable Hashing into Elliptic Curves Santiago Zanella B´eguelin1 Gilles Barthe2 , Benjamin Gr´egoire3 , Sylvain Heraud3 and Federico Olmedo2

Add to Reading List

Source URL: certicrypt.gforge.inria.fr

Language: English - Date: 2013-06-17 13:32:36
UPDATE