Hashing

Results: 1317



#Item
751Statistics / Hashing / Time series analysis / Data analysis / Error detection and correction / Exponential smoothing / Twitter / Hash function / Moving average / Information science / Search algorithms / Information retrieval

SigniTrend: Scalable Detection of Emerging Topics in Textual Streams by Hashed Significance Thresholds Preprint — publisher version available at http://dx.doi.org[removed][removed]Erich Schubert, Michael Weiler,

Add to Reading List

Source URL: www.dbs.ifi.lmu.de

Language: English - Date: 2014-08-26 11:30:08
752Cryptography / Information retrieval / Artificial intelligence / Applied mathematics / Block cipher / Universal hashing / Hash function / Hashing / Search algorithms / Cryptographic hash functions

Improving Upon the TET Mode of Operation Palash Sarkar Applied Statistics Unit Indian Statistical Institute 203, B.T. Road, Kolkata India[removed].

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-08-14 08:08:11
753Technology / Error detection and correction / IOS / ITunes / Hashing / Md5sum / IPhone / IPad / Automated teller machine / Computing / Cryptographic hash functions / Apple Inc.

10 Tips of the Day John Hally[removed]Know who you are allowing to enter a secure building or area. It is polite to hold the door open for someone, but this circumvents the purpose of physical

Add to Reading List

Source URL: www.sans.edu

Language: English - Date: 2012-08-27 18:45:04
754Cryptographic hash functions / Hashing / SHA-2 / Transport Layer Security / SHA-1 / HMAC / Message authentication code / Collision attack / Key size / Cryptography / Cryptographic protocols / Internet protocols

Approved Cryptographic Algorithms Good Practice Guideline Programme NHS Informatics

Add to Reading List

Source URL: systems.hscic.gov.uk

Language: English
755Cryptography / Cryptographic hash functions / Finite fields / Hashing / Polynomials / Cyclic redundancy check / Polynomial code / Universal hashing / Polynomial / Mathematics / Error detection and correction / Algebra

1 Cryptographically Secure CRC for Lightweight Message Authentication Elena Dubrova∗ , Mats N¨aslund† , G¨oran Selander† , Fredrik Lindqvist† ∗ Royal

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-15 04:13:19
756Hashing / Search algorithms / Password / SHA-2 / Hash function / Crypt / Salt / PBKDF2 / Bcrypt / Cryptography / Cryptographic hash functions / Cryptographic software

Rig: A simple, secure and flexible design for Password Hashing Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-D), India {donghoon,arpanj,swe

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-07 03:55:02
757FIPS 140-2 / FIPS 140 / USB flash drive / Cryptographic Module Validation Program / HMAC / Kingston Technology / Password / Universal Serial Bus / Cryptographic hash function / Cryptography / Cryptography standards / Hashing

Microsoft Word - 1g - Kingston DT4000 G2 FIPS[removed]Level 3 Security Policy v1.8.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-01-05 14:47:56
758Cryptographic hash functions / Message authentication codes / Hashing / Internet protocols / FIPS 140-2 / FIPS 140 / SHA-2 / HMAC / IPsec / Cryptography / Cryptography standards / Error detection and correction

Microsoft Word - Acme Packet 4500 FIPS[removed]Security Policy v2-4v2 with gtk comments.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-09 17:35:30
759Cryptographic hash functions / Message authentication codes / Hashing / Internet protocols / FIPS 140-2 / FIPS 140 / SHA-2 / Cryptographic Module Validation Program / IPsec / Cryptography / Cryptography standards / Error detection and correction

Microsoft Word - Acme Packet 3820 FIPS[removed]Security Policy v2-3.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-09 14:34:44
UPDATE