Hashing

Results: 1317



#Item
441Pseudorandomness / Computational complexity theory / Randomness / Hashing / Pseudorandom generator theorem / Pseudorandom generator / One-way function / Hard-core predicate / Cryptographic hash function / Cryptography / Theoretical computer science / Applied mathematics

Saving Private Randomness in One-Way Functions and Pseudorandom Generators Nenad Dedi´c∗ ‡ § Danny Harnik† §

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-12-10 11:39:44
442Information retrieval / Information science / Trie / Perfect hash function / Hash function / Bit array / Logarithm / Bloom filter / Hash table / Search algorithms / Hashing / Mathematics

Theory and Practice of Monotone Minimal Perfect Hashing DJAMAL BELAZZOUGUI Université Paris Diderot–Paris 7, France PAOLO BOLDI Università degli Studi di Milano, Italy RASMUS PAGH

Add to Reading List

Source URL: vigna.di.unimi.it

Language: English - Date: 2011-11-04 10:29:52
443Computing / Cryptographic hash functions / Hashing / SHA-2 / Internet protocols / HMAC / Bouncy Castle / SHA-1 / IPsec / Cryptography / Error detection and correction / Cryptographic software

Bouncy Castle FIPS Java API 1 MayIntroduction The Bouncy Castle APIs (BC) divide into 3 groups: there is a light-weight API which provides direct

Add to Reading List

Source URL: www.bouncycastle.org

Language: English - Date: 2015-05-08 17:24:41
444Hashing / Search algorithms / MD5 / X.509 / Simple public key infrastructure / Hash function / HMAC / Cryptographic hash function / Crypt / Cryptography / Public-key cryptography / Key management

Pisces User Manual Release 1.0 alpha 1 Jeremy Hylton April 27, 2000 Corporation for National Research Initiatives

Add to Reading List

Source URL: www.cnri.reston.va.us

Language: English - Date: 2013-05-09 14:48:28
445Mathematics / Supersingular elliptic curve / Hyperelliptic curve cryptography / Curve / Hessian form of an elliptic curve / Classical modular curve / Abstract algebra / Elliptic curves / Cryptography

Fast hashing to G2 on pairing friendly curves Michael Scott, Naomi Benger, Manuel Charlemagne, Luis J. Dominguez Perez, and Ezekiel J. Kachisa School of Computing Dublin City University Ballymun, Dublin 9, Ireland.

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-18 11:36:28
446Information science / Artificial intelligence / Bloom filter / Universal hashing / Hash function / Hash table / Cryptographic hash function / Tabulation hashing / Cuckoo hashing / Hashing / Search algorithms / Information retrieval

Simpler operations Advanced Algorithms – COMS31900Lecture 5 Bloom filters

Add to Reading List

Source URL: www.cs.bris.ac.uk

Language: English - Date: 2014-03-11 09:18:19
447Fault-tolerant computer systems / NoSQL / Erlang programming language / Mnesia / Gossip protocol / Computer cluster / Erlang / Consistent hashing / Node / Computing / Data management / Structured storage

Distributed Erlang Systems In Operation Andy Gross <>, @argv0 VP, Engineering Basho Technologies Erlang Factory SF 2010

Add to Reading List

Source URL: www.erlang-factory.com

Language: English - Date: 2011-09-19 06:17:30
448Computing / MD5 / HMAC / Cryptographic hash function / MD2 / Md5sum / Public key fingerprint / Fingerprint / Checksum / Cryptography / Error detection and correction / Hashing

Perl versiondocumentation - Digest::MD5 NAME Digest::MD5 - Perl interface to the MD5 Algorithm SYNOPSIS

Add to Reading List

Source URL: perldoc.perl.org

Language: English - Date: 2014-10-03 15:19:29
449Hash function / Cryptographic hash functions / Information retrieval / Artificial intelligence / Cyberwarfare / Cryptography / Hashing / Error detection and correction

COMPUTER SCIENCE TRIPOS Part IB – 2012 – Paper 4 9 Security I (MGK) (a) Name and briefly explain three increasingly demanding security properties expected from a secure hash function h.

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2014-06-09 10:18:42
450Cryptographic hash functions / Error detection and correction / File sharing networks / Computer programming / Hash tree / Distributed hash table / Kademlia / Hash list / BitTorrent / Distributed data storage / Hashing / Computing

IPFS - Content Addressed, Versioned, P2P File System (DRAFT 3) Juan Benet ABSTRACT

Add to Reading List

Source URL: static.benet.ai

Language: English - Date: 2014-07-24 07:13:01
UPDATE