Hashing

Results: 1317



#Item
541Computer architecture / Classes of computers / Parallel computing / Information science / Error detection and correction / Hash function / Hash table / CPU cache / Trie / Computing / Search algorithms / Hashing

Department of Electrical and Computer Systems Engineering Technical Report MECSE

Add to Reading List

Source URL: www.ecse.monash.edu.au

Language: English - Date: 2007-11-19 17:29:34
542Search algorithms / Error detection and correction / MD5 / Collision resistance / Hash function / SHA-1 / Birthday attack / Collision / Quadratic probing / Cryptographic hash functions / Cryptography / Hashing

Chapter 6 Hash Functions A hash function usually means a function that compresses, meaning the output is shorter than the input. Often, such a function takes an input of arbitrary or almost arbitrary length to one whose

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2009-09-20 23:24:55
543Claw-free permutation / MD5 / One-way function / Universal one-way hash function / SHA-1 / Provably secure cryptographic hash function / Elliptic curve only hash / Cryptographic hash functions / Cryptography / Hash function

An abridged version of this paper appears in Advances in Cryptology { Eurocrypt 97 Proceedings, Lecture Notes in Computer Science Vol. 1233, W. Fumy ed., Springer-Verlag, 1997. A New Paradigm for Collision-free Hashing:

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 1998-07-30 12:00:14
544Peer-to-peer computing / Computing / Payment systems / Financial cryptography / Hashing / Cryptography / Software / Bitcoin

Exploring Miner Evolution in Bitcoin Network Luqin Wang1 and Yong Liu2 1 2 Department of Computer Science and Engineering

Add to Reading List

Source URL: wan.poly.edu

Language: English - Date: 2015-03-19 12:24:33
545Hashing / System software / Error detection and correction / Hash table / Hash function / Computer virus / Hash list / COM file / Ar / Computing / Search algorithms / Software

VIRUS BULLETIN www.virusbtn.com MALWARE ANALYSIS MAKING A HASH OF THINGS Peter Ferrie Microsoft, USA

Add to Reading List

Source URL: vxheaven.org

Language: English - Date: 2009-09-01 15:48:44
546Hashing / HMAC / SHA-1 / Advanced Encryption Standard / SHA-2 / Cryptographic protocols / Error detection and correction / Cryptography / Cryptographic hash functions

Microsoft Word - CTP RevisionregardingStep 4.doc

Add to Reading List

Source URL: dcimovies.com

Language: English - Date: 2014-04-30 01:19:05
547Error detection and correction / Key management / Digital signature / Cryptographic hash function / Hash function / Hash tree / RSA / Lamport signature / Merkle signature scheme / Cryptography / Public-key cryptography / Hashing

SPHINCS: practical stateless hash-based signatures Daniel J. Bernstein1,3 , Daira Hopwood2 , Andreas Hülsing3 , Tanja Lange3 , Ruben Niederhagen3 , Louiza Papachristodoulou4 , Michael Schneider,

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-09 11:36:42
548Computing / Hashing / Mathematics / Applied mathematics / Hash table / Hash function / Parallel computing / Algorithm / Collision / Cryptographic hash functions / Search algorithms / Cryptography

MOMENTUM - A MEMORY-HARD PROOF-OF-WORK VIA FINDING BIRTHDAY COLLISIONS DANIEL LARIMER Invictus Innovations, Inc ABSTRACT. We introduce the concept of memory-hard proof-of-work

Add to Reading List

Source URL: hashcash.org

Language: English - Date: 2014-01-13 13:07:17
549Error detection and correction / Search algorithms / Proof-of-work system / Lamport signature / Hash function / Hash tree / SHA-1 / Hash list / Trie / Cryptography / Cryptographic hash functions / Hashing

An (Almost) Constant-Effort Solution-Verification Proof-of-Work Protocol based on Merkle Trees (extended and colored version of [7]) Fabien Coelho ´ CRI, Ecole des mines de Paris,

Add to Reading List

Source URL: hashcash.org

Language: English - Date: 2008-06-22 07:14:34
550Hashing / MD5 / HMAC / SHA-2 / Collision attack / SHA-1 / Crypt / Merkle–Damgård construction / Hash function / Error detection and correction / Cryptographic hash functions / Cryptography

CIS 331 Introduction to Networks & Security January 23, 2014 Project 1: Attacking Cryptographic Hashes

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2014-11-18 15:19:13
UPDATE