Hashing

Results: 1317



#Item
451Information science / Artificial intelligence / Cuckoo hashing / Hash table / Hash function / Perfect hash function / Dynamic perfect hashing / Tabulation hashing / Universal hashing / Hashing / Search algorithms / Information retrieval

Advanced Algorithms – COMS31900Lecture 4 Cuckoo hashing Markus Jalsenius

Add to Reading List

Source URL: www.cs.bris.ac.uk

Language: English - Date: 2014-03-11 09:18:18
452Information science / Artificial intelligence / Hash table / Hash function / Cryptographic hash function / Linear probing / Java hashCode() / Quadratic probing / Hashing / Search algorithms / Information retrieval

3.4 HASH TABLES Algorithms F O U R T H R O B E R T

Add to Reading List

Source URL: t2.hhg.to

Language: English - Date: 2012-04-03 10:31:39
453Information science / Artificial intelligence / Hash table / Universal hashing / Hash function / Perfect hash function / Cryptographic hash function / Associative array / Tabulation hashing / Hashing / Search algorithms / Information retrieval

Advanced Algorithms – COMS31900Lecture 3 Static Perfect Hashing

Add to Reading List

Source URL: www.cs.bris.ac.uk

Language: English - Date: 2014-03-11 09:18:18
454Advanced Encryption Standard / Hashing / Disk encryption / FIPS 140-2 / HMAC / Key size / FIPS 140 / AES instruction set / SHA-2 / Cryptography / Cryptography standards / Cryptographic software

Vormetric, Inc Vormetric Encryption Expert Cryptographic Module Software VersionFIPSNon-Proprietary Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-03-24 07:36:43
455Cryptographic hash functions / Hashing / Internet standards / Email / MD5 / Crypt / SHA-2 / MD4 / HMAC / Error detection and correction / Computing / Cryptography

Perl versiondocumentation - Digest NAME Digest - Modules that calculate message digests SYNOPSIS

Add to Reading List

Source URL: perldoc.perl.org

Language: English - Date: 2014-10-03 15:56:11
456Internet protocols / Internet standards / Secure communication / FIPS 140-2 / HMAC / Advanced Encryption Standard / NetBackup / Cryptographic hash function / Cryptographic Module Validation Program / Cryptography / Cryptography standards / Hashing

Microsoft Word - 1a - SYMC NBU FIPS 140 Security Policy v1-0.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-01-14 11:56:40
457Hash table / Hash list / Information retrieval / Artificial intelligence / Information science / Cryptographic hash functions / Hashing / Error detection and correction

Overview of NFD Beichuan Zhang The University Of Arizona What is NFD

Add to Reading List

Source URL: www.caida.org

Language: English - Date: 2015-02-02 18:48:25
458Hash function / Information retrieval / Artificial intelligence / Information science / Cryptography / Cryptographic hash function / Message authentication codes / Hashing / HMAC

############################################################## Keyed-Hash Message Authentication Code (HMAC) Hashlen = 224 ############################################################## Key length = 64

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-08-08 12:49:28
459Computer programming / Information retrieval / Hash table / Hash function / Cryptographic hash function / Lookup table / Van Emde Boas tree / Associative array / Universal hashing / Hashing / Search algorithms / Computing

Advanced Algorithms – COMS31900Lecture 2 Hash tables Markus Jalsenius

Add to Reading List

Source URL: www.cs.bris.ac.uk

Language: English - Date: 2014-03-11 09:18:18
460Hashing / Cryptographic software / Advanced Encryption Standard / HMAC / SHA-2 / SHA-1 / FIPS 140-2 / FIPS 140 / Key size / Cryptography / Cryptography standards / Cryptographic hash functions

Microsoft Word - SamsungCryptoAPI_SPv1.12

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-03-16 09:56:13
UPDATE