Hashing

Results: 1317



#Item
461Computer security / MD5 / Cryptographic hash functions / Search algorithms / Archive formats / Crypt / GNU Privacy Guard / Zip / MD4 / Cryptography / Computing / Hashing

Practical Attacks on Digital Signatures Using MD5 Message Digest Ondrej Mikle Department of Software Engineering at Faculty of Mathematics and Physics, Charles University, Prague, Czech Republic

Add to Reading List

Source URL: cryptography.hyperlink.cz

Language: English - Date: 2004-12-02 07:12:00
462Computing / Cryptography / Computer programming / B-tree / Search algorithms / Hash function / Bloom filter / MD5 / Binary tree / Hashing / Cryptographic hash functions / Error detection and correction

FastAD: An Authenticated Directory for Billions of Objects Paul T. Stanton, Benjamin McKeown, Randal Burns, Giuseppe Ateniese Department of Computer Science, Johns Hopkins University ABSTRACT We develop techniques that m

Add to Reading List

Source URL: www.sigops.org

Language: English - Date: 2009-09-28 22:39:23
463Database management systems / Data / Hash join / Hashing / Database theory / Hash function / Sort-merge join / Stack / Data integration / Search algorithms / Computing / Data management

On Producing High and Early Result Throughput in Multi-join Query Plans Justin J. Levandoski, Member, IEEE, Mohamed E. Khalefa, Member, IEEE, and Mohamed F. Mokbel, Member, IEEE Abstract—This paper introduces an effici

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2010-06-27 17:44:37
464Hashing / MD4 / GOST / Cryptographic software / Block cipher modes of operation / Crypt / SHA-1 / Symmetric-key algorithm / Block cipher / Cryptography / Cryptographic hash functions / GOST standards

Performance of Symmetric Ciphers and One-way Hash Functions Michael Roe Cambridge University Computer Laboratory 1

Add to Reading List

Source URL: www.chiark.greenend.org.uk

Language: English - Date: 2010-08-20 09:24:45
465Hash function / Hashcash / Hash list / Hash / Computing / Information / Error detection and correction / Hashing / Search algorithms

HASH HOUSE HARRIERS SINGAPORE FOUNDEDA MEN ONLY RUN) ______________________________________________________________________________________

Add to Reading List

Source URL: www.hhhs.org.sg

Language: English - Date: 2015-02-25 01:13:35
466Information retrieval / Information science / Bloom filter / Universal hashing / Hash table / Hash function / Perfect hash function / Cuckoo hashing / Dynamic perfect hashing / Search algorithms / Hashing / Artificial intelligence

6.897: Advanced Data Structures Spring 2005 Lecture 2 — February 3, 2005 Lecturer: Mihai Pˇ

Add to Reading List

Source URL: courses.csail.mit.edu

Language: English - Date: 2005-03-02 11:21:40
467Hashing / Symmetric-key algorithm / RC4 / RC5 / Block cipher / SHA-1 / Crypt / GOST / Cipher / Cryptography / Stream ciphers / Cryptographic hash function

Performance of Block Ciphers and Hash Functions — One Year Later Michael Roe Cambridge University Computer Laboratory, Pembroke Street, Cambridge CB2 3QG, UK Email:

Add to Reading List

Source URL: www.chiark.greenend.org.uk

Language: English - Date: 2010-08-20 09:24:51
468Cryptographic software / Hashing / Block cipher / SHA-1 / Cipher / Cryptographic primitive / Crypt / CRYPTREC / BeeCrypt / Cryptography / Advanced Encryption Standard / Cryptographic hash functions

Performance of Protocols (Extended Abstract) Michael Roe Centre for Communications Systems Research 1

Add to Reading List

Source URL: www.chiark.greenend.org.uk

Language: English - Date: 2010-08-20 09:24:55
469Peer-to-peer / Bloom filter / Cyberwarfare / Cryptographic hash function / Detective / Denial-of-service attack / ANts P2P / Computer security / Hashing / File sharing networks / Computing

Fighting Coordinated Attackers with Cross-Organizational Information Sharing Mark Allman† , Ethan Blanton‡ , Vern Paxson† , Scott Shenker† Computer Science Institute, ‡ Purdue University † International

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2006-11-16 13:20:37
470Error detection and correction / Information retrieval / Information science / Cryptographic hash functions / Hash function / Forwarding plane / Hash table / Traffic flow / Count-Min sketch / Hashing / Computing / Search algorithms

pics/optim-cmss-space-0.2-ss1.0.eps

Add to Reading List

Source URL: www-bcf.usc.edu

Language: English - Date: 2013-02-21 14:29:31
UPDATE