Hashing

Results: 1317



#Item
411Information science / Artificial intelligence / Tabulation hashing / Hash function / Linear probing / Cuckoo hashing / Cryptographic hash function / Hash list / Universal hashing / Hashing / Search algorithms / Information retrieval

May 2013 MADALGO seminar by Mikkel Thorup, University of Copenhagen The Power of Tabulation Hashing Abstract: Abstract Randomized algorithms are often enjoyed for their simplicity, but the hash functions used to yield

Add to Reading List

Source URL: old-madalgo.au.dk

Language: English - Date: 2013-05-10 08:51:10
412Computer programming / Search algorithms / Compiler construction / Error detection and correction / Hash function / Cryptographic hash function / Hash table / Lexical analysis / Parsing / Computing / Software engineering / Hashing

Code Similarity Detection in Multiple Large Source Trees using Token Hashes Dr. Warren Toomey School of IT, Bond University Queensland. Australia

Add to Reading List

Source URL: minnie.tuhs.org

Language: English - Date: 2011-12-11 22:34:52
413Computer vision / Symmetry / Vision / Hash table / Geometric hashing / Object recognition / Hash function / Rotational symmetry / Sampling / Search algorithms / Statistics / Artificial intelligence

Procedia Computer Science–15 Procedia Computer Science

Add to Reading List

Source URL: users.isr.ist.utl.pt

Language: English - Date: 2014-10-02 16:21:53
414Error detection and correction / Cryptography / Information retrieval / Computing / Hash table / Hash function / Rainbow table / NTLM / Hash / Search algorithms / Hashing / Cryptographic hash functions

Advancements in TMTOs Steve Thomas “Sc00bz” Passwords^12 TobTu.com/passwords12 1

Add to Reading List

Source URL: passwords12.at.ifi.uio.no

Language: English - Date: 2012-12-06 12:19:04
415Error detection and correction / Search algorithms / Hash function / MD5 / Collision / SHA-1 / Hash list / Claw-free permutation / Collision attack / Cryptographic hash functions / Cryptography / Hashing

Secure Names for Bit-Strings Stuart Haber* W. Scott Stornetta*

Add to Reading List

Source URL: nakamotoinstitute.org

Language: English - Date: 2014-03-23 11:44:47
416Computer programming / Mathematics / Hashing / Search algorithms / Error detection and correction / Space–time tradeoff / CPU cache / Dynamic random-access memory / Hash function / Computing / Software optimization / Computer memory

Fast and Tradeoff-Resilient Memory-Hard Functions for Cryptocurrencies and Password Hashing Alex Biryukov University of Luxembourg

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-06 04:22:19
417Search algorithms / Discrete geometry / Data mining / Machine learning / Approximation algorithms / Nearest neighbor search / Voronoi diagram / Computational geometry / K-nearest neighbor algorithm / Information science / Mathematics / Geometry

Optimal Data-Dependent Hashing for Approximate Near Neighbors Alexandr Andoni1 1 Simons 2 MIT,

Add to Reading List

Source URL: www.ilyaraz.org

Language: English - Date: 2015-04-20 15:32:53
418PBKDF2 / Password / Salt / Crypt / LastPass Password Manager / SHA-2 / Bcrypt / SHA-1 / MD5 / Cryptography / Cryptographic hash functions / Cryptographic software

Hashing Algorithms: The Good, the Bad, and the Fail Steve Thomas “Sc00bz” Passwords^12 TobTu.com/passwords12

Add to Reading List

Source URL: passwords12.at.ifi.uio.no

Language: English - Date: 2012-12-06 12:18:45
419HMAC / Cryptographic hash function / Internet protocols / Cryptographic protocols / Key / FIPS 140-2 / Cryptography standards / SHA-2 / Cryptography / Message authentication codes / Hashing

FIPS PUB 198 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION The Keyed-Hash Message Authentication Code (HMAC)

Add to Reading List

Source URL: techheap.packetizer.com

Language: English - Date: 2002-12-15 10:56:45
420Hashing / MD5 / SHA-1 / MD4 / RIPEMD / Crypt / Padding / Digital signature / SHA-2 / Cryptography / Error detection and correction / Cryptographic hash functions

Contents I Table of Contents Part I Introduction

Add to Reading List

Source URL: www.bytefusion.com

Language: English - Date: 2007-05-31 21:17:32
UPDATE