Hashing

Results: 1317



#Item
351Cryptographic protocols / Cryptographic software / Hashing / Secure communication / IPsec / HMAC / Secure Shell / Key generation / Cryptographic hash function / Cryptography / Computing / Internet protocols

IC2M Security Policy_rel5

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-05-28 11:20:09
352Expected value / Statistical distance

Verified Indifferentiable Hashing into Elliptic Curves Gilles Barthe1 , Benjamin Gr´egoire2, Sylvain Heraud2 , Federico Olmedo1 , and Santiago Zanella B´eguelin1 1

Add to Reading List

Source URL: software.imdea.org

Language: English - Date: 2013-03-13 12:33:24
353Search algorithms / Computing / Information retrieval / Artificial intelligence / Cryptography / Hash function / Online codes / Hash list / Hash tree / Cryptographic hash functions / Error detection and correction / Hashing

PDF Document

Add to Reading List

Source URL: coralcdn.org

Language: English - Date: 2004-03-19 09:39:34
354Arrays / Data management / Bloom filter / Search algorithms / Bit array / Lookup table / Hash function / Filter / SQL / Computing / Computer programming / Hashing

Invertible Bloom Lookup Tables Joe Simons presenting paper by Goodrich and Mitzenmacher Bloom Filter

Add to Reading List

Source URL: www.ics.uci.edu

Language: English - Date: 2012-10-01 19:32:21
355Cryptographic software / System software / Hashing / OpenSSL / MD5 / SHA-2 / Crypt / SHA-1 / Base64 / Cryptography / Cryptographic hash functions / Computing

Package ‘openssl’ May 11, 2015 Type Package Title Bindings to OpenSSL Version 0.4 Date

Add to Reading List

Source URL: cran.r-project.org

Language: English - Date: 2015-05-11 05:21:58
356Combinatorics / Cryptography / Search algorithms / Applied mathematics / SHA-2 / Theoretical computer science / Permutation / Hash function / Independence / Mathematics / Cryptographic hash functions / Hashing

i A random zoo: sloth, un∨corn, and trx Arjen K. Lenstra and Benjamin Wesolowski EPFL IC LACAL, Station 14, CH-1015 Lausanne, Switzerland Abstract. Many applications require trustworthy generation of public random num

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-22 06:51:37
357Extendible hashing / Logarithm / Ordinal number / Artificial intelligence / Search algorithms / Hashing / Mathematics

ANALCO-2004, New Orleans, JAN 2004 Theory and Practice of Probabilistic Counting Algorithms Philippe Flajolet, INRIA, Rocquencourt

Add to Reading List

Source URL: algo.inria.fr

Language: English - Date: 2004-01-04 12:09:36
358MD5 / Search algorithms / Collision attack / MD4 / Hash function / Merkle–Damgård construction / Preimage attack / Crypt / SHA-1 / Cryptography / Cryptographic hash functions / Hashing

An algorithm for MD5 single-block collision attack using high-performance computing cluster

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-11-07 01:57:01
359Artificial intelligence / Graphics hardware / GPGPU / Video cards / Nearest neighbor search / Graphics processing unit / Bin / Locality-sensitive hashing / K-nearest neighbor algorithm / Information science / Search algorithms / Computing

Distance Threshold Similarity Searches on Spatiotemporal Trajectories using GPGPU Michael Gowanlock Dept. of Information and Computer Sciences and NASA Astrobiology Institute University of Hawai‘i, Honolulu, HI, U.S.A.

Add to Reading List

Source URL: navet.ics.hawaii.edu

Language: English - Date: 2014-09-12 22:34:57
360Error detection and correction / Search algorithms / Data synchronization / Rsync / Cryptographic hash functions / Hashing / Transmission Control Protocol / Checksum / Sum / Computing / Data / System software

Int. J. Communications, Network and System Sciences, 2013, 6, 37-51 doi:ijcnsPublished Online Januaryhttp://www.scirp.org/journal/ijcns) Scalable Incremental Network Programming for Multihop Wi

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2013-02-07 00:17:36
UPDATE