Hashing

Results: 1317



#Item
651Hashing / Search algorithms / Preimage attack / Rope / Entailment / Collision attack / Hash function / Logic / Cryptographic hash functions / Cryptography

formát Název-moje šablona pro docy

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-01-02 11:28:32
652Information science / Information retrieval / Hash function / Hash table / Double hashing / Bloom filter / Cuckoo hashing / Search algorithms / Hashing / Artificial intelligence

Computing Iceberg Queries

Add to Reading List

Source URL: www.vldb.org

Language: English - Date: 2006-07-29 01:39:37
653NIST hash function competition / SHA-2 / Vlastimil Klíma / Hash function / Crypt / SHA-1 / Comparison of cryptographic hash functions / Cryptographic hash functions / Cryptography / Hashing

Microsoft PowerPoint - 1_BlueMidnightWish-Presentation-Final.ppt

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-05 10:49:12
654Cryptographic software / Cryptographic hash functions / X86 architecture / Hashing / Cryptography standards / OpenSSL / SHA-2 / AES instruction set / FIPS 140-2 / Cryptography / Computer architecture / Error detection and correction

ODT Document

Add to Reading List

Source URL: www.openssl.org

Language: English - Date: 2014-11-25 17:47:07
655Hashing / HMAC / SHA-1 / Advanced Encryption Standard / SHA-2 / Cryptographic protocols / Error detection and correction / Cryptography / Cryptographic hash functions

Microsoft Word - CTP Revision[removed]regarding[removed]Step 4.doc

Add to Reading List

Source URL: www.dcimovies.com

Language: English - Date: 2014-04-30 01:19:05
656Hashing / SHA-2 / Hash function / HMAC / Endianness / Preimage attack / Padding / Collision attack / GOST / Error detection and correction / Cryptography / Cryptographic hash functions

Cryptographic Hash Function E DON - R Norwegian University of Science and Technology Trondheim, Norway

Add to Reading List

Source URL: cryptography.hyperlink.cz

Language: English - Date: 2009-02-11 09:26:04
657Hashing / Computing / Data logger / Recorders / Computer data logging / Log analysis / HMAC / Hash function / Public-key cryptography / Cryptography / Technology / Search algorithms

Continuous Tamper-proof Logging using TPM2.0 Paul England, Limin Jia, James Lorch, and Arunesh Sinha July 9, 2013 (Revised June 16, 2014)

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2014-11-11 20:30:18
658Linear algebra / Information retrieval / Search algorithms / Vectors / Abstract algebra / Locality-sensitive hashing / Nearest neighbor search / Vector space / Dot product / Algebra / Mathematics / Information science

LEMP: Fast Retrieval of Large Entries in a Matrix Product Christina Teflioudi Rainer Gemulla

Add to Reading List

Source URL: dws.informatik.uni-mannheim.de

Language: English - Date: 2015-04-21 05:27:14
659Information retrieval / Information science / Artificial intelligence / Hash function / Filter / Bit array / Electronic filter / Cuckoo hashing / Hashing / Search algorithms / Bloom filter

PDF Document

Add to Reading List

Source URL: www.cs.bris.ac.uk

Language: English - Date: 2014-01-08 09:09:07
660Hashing / MD5 / Merkle–Damgård construction / Hash function / Preimage attack / Collision / Crypt / One-way compression function / Tiger / Cryptography / Cryptographic hash functions / Error detection and correction

Collisions in MD5 Antoine Delignat-Lavaud Collisions in MD5 ... and how to use them for fun and profit.

Add to Reading List

Source URL: antoine.delignat-lavaud.fr

Language: English - Date: 2010-08-17 15:48:58
UPDATE