Hashing

Results: 1317



#Item
761Cryptographic hash functions / Cryptography standards / Advanced Encryption Standard / FIPS 140-2 / Key size / SHA-2 / Block cipher / HMAC / SHA-1 / Cryptography / Cryptographic software / Hashing

FIPS PUB[removed]Security Policy for SAP NW SSO 2.0 Secure Login Library Crypto Kernel Document version: 1.4 Date: [removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-01-05 14:56:17
762Chernoff bound / Mathematics / Concentration inequality

Low-Density Parity Constraints for Hashing-Based Discrete Integration

Add to Reading List

Source URL: jmlr.org

Language: English - Date: 2014-02-16 19:30:21
763Cryptographic hash functions / Computer programming / Information retrieval / Computational complexity theory / Universal hashing / Hash function / Lookup table / Hashing / Search algorithms / Computing

Low-Density Parity Constraints for Hashing-Based Discrete Integration

Add to Reading List

Source URL: jmlr.org

Language: English - Date: 2014-02-16 19:30:21
764Error detection and correction / SHA-1 / Hash list / Hash function / Crypt / Digital signature / SHA / Magnet URI scheme / File verification / Cryptography / Cryptographic hash functions / Hashing

LandXML LandXML – Signing & Sealing by Warren G. Clary, PE

Add to Reading List

Source URL: www.iheep2014.com

Language: English - Date: 2015-01-22 17:50:03
765Computing / Search algorithms / Information / Data / Hash tree / Hash function / Hash list / Trie / Database index / Error detection and correction / Hashing / Cryptographic hash functions

TRUSTED ARCHIVE OVERVIEW ARCHIVE RECONCILIATION AT MASSIVE SCALE USING MERKEL TREES

Add to Reading List

Source URL: www.bloomberg.com

Language: English - Date: 2014-12-23 13:21:52
766Error detection and correction / Computing / Computer programming / Search algorithms / Treap / Hash tree / Hash function / Binary search tree / Cryptographic hash function / Cryptography / Hashing / Binary trees

Balloon: A Forward-Secure Append-Only Persistent Authenticated Data Structure Tobias Pulls Roel Peeters

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-15 08:57:40
767Error detection and correction / Internet protocols / Secure communication / Hashing / Cryptographic protocols / HMAC / Transport Layer Security / SHA-2 / Cryptographic hash function / Cryptography / Cryptographic software / Computing

Microsoft Word - 1l - Accellion Security Policy_Acc_IGL_2014[removed]Accellion response.docx

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-24 11:16:41
768Peer-to-peer computing / Computing / Cryptographic hash functions / Hashing / Dwolla / Cryptography / Software / Bitcoin

Finance and Economics Discussion Series Divisions of Research & Statistics and Monetary Affairs Federal Reserve Board, Washington, D.C. Bitcoin: Technical Background and Data Analysis

Add to Reading List

Source URL: federalreserve.gov

Language: English - Date: 2014-12-19 13:00:16
769Message authentication codes / HMAC / Hashing / Advanced Encryption Standard / FIPS 140 / Key / Transport Layer Security / Cryptography / Cryptography standards / Cryptographic protocols

Barco ICMP FIPS[removed]Non-Proprietary Security Policy ICMP Barco ICMP FIPS 140-2

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-24 11:48:39
770Computing / Bitcoin / Peer-to-peer computing / Cryptographic hash functions / Error detection and correction / Proof-of-work system / Cryptographic nonce / Stakeholder / Transmission Control Protocol / Cryptography / Software / Hashing

Proof of Activity: Extending Bitcoin’s Proof of Work via Proof of Stake Iddo Bentov∗ Charles Lee Alex Mizrahi

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-06-11 22:53:58
UPDATE