Hashing

Results: 1317



#Item
491Hashing / Computing / Search algorithms / MD5 / HMAC / Crypt / Collision attack / SHA-1 / Md5sum / Error detection and correction / Cryptography / Cryptographic hash functions

1 MD5 To Be Considered Harmful Someday Dan Kaminsky Senior Security Consultant, Avaya

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-12-06 19:52:41
492Information science / Artificial intelligence / Hash table / Hash join / Hash function / Block nested loop / Trie / Search algorithms / Hashing / Information retrieval

Hash-Merge Join: A Non-blocking Join Algorithm for Producing Fast and Early Join Results∗ Mohamed F. Mokbel Ming Lu

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2009-09-29 10:22:41
493Search algorithms / SQL / Data / Information retrieval / Hash join / Hash function / Join / Database / Throughput / Database management systems / Data management / Hashing

1 PermJoin: An Efficient Algorithm for Producing Early Results in Multi-join Query Plans Justin J. Levandoski

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2009-09-29 10:22:40
494Hashing / Mathematics / Cryptography / Error detection and correction / Randomized algorithm / Linear probing / Hash table / Hash function / Algorithm / Search algorithms / Applied mathematics / Theoretical computer science

Derandomization, Hashing and Expanders ´ Milan Ruˇ zic A PhD Dissertation

Add to Reading List

Source URL: www.itu.dk

Language: English - Date: 2011-09-30 03:17:26
495Artificial intelligence / Nearest neighbor search / Locality-sensitive hashing / K-nearest neighbor algorithm / K-d tree / Voronoi diagram / Shape context / Computational geometry / Algorithm / Information science / Search algorithms / Mathematics

1 Introduction Gregory Shakhnarovich, Piotr Indyk, and Trevor Darrell The nearest-neighbor (NN) problem occurs in the literature under many

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2006-03-03 12:41:25
496Preimage attack / Hashing / Search algorithms / MD5 / SHA-1 / Image / SHA-2 / Collision resistance / Function / Cryptographic hash functions / Cryptography / Mathematics

Improved (Pseudo) Preimage Attack and Second Preimage Attack on Round-Reduced Grøstl Jian Zou, Wenling Wu, Shuang Wu, and Le Dong Institute of Software Chinese Academy of Sciences Beijing, China

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-10 07:37:20
497Finite fields / Computational complexity theory / Diffie–Hellman problem / ElGamal encryption / Universal hashing / Paillier cryptosystem / Diffie–Hellman key exchange / Cramer–Shoup cryptosystem / Index of cryptography articles / Cryptography / Cryptographic protocols / Public-key cryptography

A new security proof for Damg˚ ard’s ElGamal Kristian Gjøsteen March 17, 2005 Abstract

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-03-17 15:37:01
498Hashing / Cryptographic hash functions / Trusted third party / Hash list / Hash function / Digital signature / RSA / Cryptography / Public-key cryptography / Error detection and correction

Microsoft PowerPoint - 05-Contract-Signing Protocols.ppt

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2005-01-05 04:11:06
499Search algorithms / Information retrieval / Dimension reduction / Neural networks / K-nearest neighbor algorithm / Anand Rajaraman / Collaborative filtering / Statistical classification / Locality-sensitive hashing / Statistics / Machine learning / Artificial intelligence

Note to other teachers and users of these slides: We would be delighted if you found this our material useful in giving your own lectures. Feel free to use these slides verbatim, or to modify them to fit your own needs.

Add to Reading List

Source URL: www.mmds.org

Language: English - Date: 2014-08-11 14:11:58
500Hashing / Error detection and correction / Hash function / Preimage attack / MD5 / Advantage / Oracle machine / Random oracle / Quadratic probing / Cryptography / Cryptographic hash functions / Search algorithms

Black-box property of Cryptographic Hash Functions? Michal Rjaˇsko Department of Computer Science Faculty of Mathematics, Physics and Informatics Comenius University Mlynsk´

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-12-11 08:37:28
UPDATE