Hashing

Results: 1317



#Item
691Geography of the United States / Jackson /  Wyoming / Jackson micropolitan area / Jackson Hole / Beer / Home / Stonewall Jackson / Teton County /  Wyoming / Wyoming / Grand Teton National Park

JANUARY[removed], 2011 l WWW.JHWEEKLY.COM Volume 9, Issue 3 New face of Puzzleface HASHING OUT CHANGES TO RANCH

Add to Reading List

Source URL: planetjh.com

Language: English - Date: 2013-06-29 16:53:25
692Mathematical logic / Hashing / Crypt / SHA-1 / Cipher / Block cipher / MD4 / Mathematical proof / Cryptography / Mathematics / Cryptographic hash functions

State Of The Art The Result A Proof Outline

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2012-04-20 07:04:20
693Bit array / Connectivity / De Bruijn graph / Depth-first search / De Bruijn / Velvet assembler / Koorde / Graph theory / Hashing / Bloom filter

Space-efficient and exact de Bruijn graph representation based on a Bloom filter Rayan Chikhi1 and Guillaume Rizk2 1 Computer Science department, ENS Cachan/IRISA, 35042 Rennes, France

Add to Reading List

Source URL: minia.genouest.org

Language: English - Date: 2012-10-09 11:54:51
694Spectrum / Support / Operator theory / Ordinary differential equations / Lambda calculus / Spectral theory of ordinary differential equations / Mathematical analysis / Spectral theory / Measure theory

Randomness in Cryptography January 10, 2013 Lecture 1: One-Time MACs, (XOR)Universal hashing, Weak Keys Lecturer: Yevgeniy Dodis

Add to Reading List

Source URL: www.cs.nyu.edu

Language: English - Date: 2014-03-05 15:25:16
695Cryptographic hash functions / Mathematics / Information retrieval / Error detection and correction / Hash function / Hash table / Key derivation function / Tabulation hashing / Rainbow table / Search algorithms / Cryptography / Hashing

STRONGER KEY DERIVATION VIA SEQUENTIAL MEMORY-HARD FUNCTIONS COLIN PERCIVAL Abstract. We introduce the concepts of memory-hard algorithms and sequential memory-hard functions, and argue that in order for key derivation f

Add to Reading List

Source URL: www.bsdcan.org

Language: English - Date: 2015-01-21 18:21:31
696Hashing / Enterprise application integration / Service-oriented architecture / SOA Security / HMAC / SHA-2 / Software engineering / Cryptography standards / Computing / Web services / Information technology management

TrustWay® box XML Gateway Bull and Vordel, partners in the supply of a certified, high-security Service-Oriented Architecture governance solution The TrustWay box XML Gateway guarantees a very high level of security a

Add to Reading List

Source URL: www.bull.com

Language: English - Date: 2010-11-29 07:31:10
697Linear algebra / Count-Min sketch / Hashing / Sketch / Search algorithms / Euclidean vector / Vector space / Hash function / Streaming algorithm / Algebra / Mathematics / Abstract algebra

Count-Min Sketch Graham Cormode AT&T Labs–Research, [removed] SYNONYMS CM Sketch

Add to Reading List

Source URL: dimacs.rutgers.edu

Language: English - Date: 2009-12-03 19:57:13
698Sorting algorithms / Computer programming / Computing / Error detection and correction / Hash function / Hash join / Join / Relational algebra / Operand / Mathematics / Search algorithms / Hashing

HASHING METHODS AND RELATIONAL Kjell Department

Add to Reading List

Source URL: www.vldb.org

Language: English - Date: 2006-07-29 01:31:01
699Applied mathematics / Mathematics / Artificial intelligence / Computational complexity theory / Hashing / Universal hashing

April 11, 2013 Randomness in Cryptography Lecture 13: Seed-Dependent Key Derivation Lecturer: Yevgeniy Dodis

Add to Reading List

Source URL: www.cs.nyu.edu

Language: English - Date: 2013-12-19 22:46:30
700Computing / MD5 / Hashing / Function / Qi / Cryptography / Mathematics / Cryptographic hash functions

A Study of the MD5 Attacks: Insights and Improvements John Black and Martin Cochran University of Colorado Trevor Highland University of Texas

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2006-04-18 10:40:57
UPDATE