Hashing

Results: 1317



#Item
421System software / Hashing / IBM General Parallel File System / Distributed computing architecture / Lustre / NTFS / File system / Consistent hashing / Clustered file system / Computing / Data management / Network file systems

GIGA+ : Scalable Directories for Shared File Systems Swapnil Patil Garth Gibson {swapnil.patil, garth.gibson} @ cs.cmu.edu

Add to Reading List

Source URL: www.pdl.cmu.edu

Language: English - Date: 2009-01-27 17:52:29
422Hashing / MD5 / HMAC / Collision attack / SHA-2 / Padding / SHA-1 / Merkle–Damgård construction / Crypt / Error detection and correction / Cryptography / Cryptographic hash functions

CIS 331 Introduction to Networks & Security January 27, 2015 Project 1: Cryptographic Attacks

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2015-02-03 14:04:06
423Search algorithms / Hashing / Preimage attack / Merkle–Damgård construction / Hash function / Alexander Sotirov / Cryptographic hash functions / Cryptography / MD5

MD5 considered harmful today Alexander Sotirov, Marc Stevens, Jacob Appelbaum, Arjen Lenstra, David Molnar, Dag Arne Osvik, Benne de Weger Presentation by: Hamidhasan G. Ahmed

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2013-09-26 13:48:46
424Software engineering / Hashing / Abstract data types / Data types / Hash table / Hash function / Set / List / Append / Search algorithms / Computing / Computer programming

CS109A Notes for LectureRepresenting Sets 1. List. Simple, O(n) dictionary operations. 2. Binary Search Tree. O(log n) average dictionary operations. Supports other operations like range queries, sorting. 3. Char

Add to Reading List

Source URL: infolab.stanford.edu

Language: English - Date: 2008-09-19 00:58:20
425Mathematics / Theoretical computer science / Pseudoforest / Cuckoo hashing / Universal hashing / Bipartite graph / Double hashing / Hash function / Graph / Graph theory / Search algorithms / Hashing

A Precise Analysis of Cuckoo Hashing MICHAEL DRMOTA and REINHARD KUTZELNIGG Technische Universit¨at Wien Cuckoo hashing was introduced by Pagh and Rodler inIts main feature is that it provides constant worst case

Add to Reading List

Source URL: www.dmg.tuwien.ac.at

Language: English - Date: 2009-03-12 07:46:10
426MD5 / Hash function / Cryptographic hash functions / Public key certificate / Hash chain / Cryptography / Hashing / Search algorithms

PayWord and MicroMint: Two simple micropayment schemes Ronald L. Rivest∗ and Adi Shamir∗∗ April 27, 2001 ∗

Add to Reading List

Source URL: hashcash.org

Language: English - Date: 2005-01-15 19:23:54
427Hashing / Hash function / SHA-2 / Key stretching / Crypt / Password / One-way compression function / Tabulation hashing / Hash table / Cryptography / Cryptographic hash functions / Search algorithms

STRICT MEMORY HARD HASHING FUNCTIONS (PRELIMINARY V0.3, SERGIO DEMIAN LERNER Abstract. We introduce the concept of strict memory hard functions. Strict memory hard functions are an extension of memory hard func

Add to Reading List

Source URL: hashcash.org

Language: English - Date: 2014-02-01 12:00:10
428Peer-to-peer computing / Hashing / Computing / Cryptographic hash functions / Error detection and correction / Cryptography / Software / Bitcoin

Discussion Paper Series A No.617 Can We Stabilize the Price of a Cryptocurrency?: Understanding the Design of Bitcoin and Its Potential to

Add to Reading List

Source URL: www.ier.hit-u.ac.jp

Language: English - Date: 2014-11-04 23:51:04
429MD5 / Hash function / Cryptographic hash functions / Public key certificate / Hash chain / Cryptography / Hashing / Search algorithms

PayWord and MicroMint: Two simple micropayment schemes Ronald L. Rivest∗ and Adi Shamir∗∗ April 27, 2001 ∗

Add to Reading List

Source URL: www.hashcash.org

Language: English - Date: 2005-01-15 19:23:54
430Information retrieval / Hashing / Error detection and correction / Hash functions / Dimension reduction / Locality-sensitive hashing / Jaccard index / Locality preserving hashing / Kullback–Leibler divergence / Search algorithms / Information science / Statistics

Similarity Estimation Techniques from Rounding Algorithms Moses S. Charikar Dept. of Computer Science Princeton University 35 Olden Street

Add to Reading List

Source URL: www.cs.princeton.edu

Language: English - Date: 2004-02-04 10:27:32
UPDATE