Hashing

Results: 1317



#Item
821Hashing / Crypt / Hash function / SHA-2 / Cryptographic hash functions / Cryptography / Search algorithms

X-Sieve: CMU Sieve 2.2 Date: Fri, 13 Apr 2007 15:43:28 +0300 From: Carmi Gressel Subject: Hash Algorithm Requirements and Evaluation Criteria To: william.burr@nist.gov, hash-function@nist.gov X-Mai

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:27:14
822Electronic commerce / Hashing / Computational complexity theory / Search algorithms / RSA / Cryptographic hash function / Communication complexity / Hash function / Homomorphic encryption / Cryptography / Theoretical computer science / Applied mathematics

On the Communication Complexity of Secure Function Evaluation with Long Output Pavel Hub´aˇcek∗ Daniel Wichs†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-26 12:48:08
823Error detection and correction / Data quality / Hash function / Digital continuity / Digital preservation / Crypt / Digital signature / Fingerprint / Hash list / Cryptography / Hashing / Cryptographic hash functions

Microsoft Word - DigitalContinuityHandout_NAGARA Judicial Records Forum

Add to Reading List

Source URL: nagara.org

Language: English - Date: 2014-06-06 16:31:44
824Error detection and correction / Search algorithms / Hash chain / Lamport signature / Hash function / Password / Hash tree / Hash / SHA-2 / Cryptography / Cryptographic hash functions / Hashing

Efficient Implementation of Keyless Signatures with Hash Sequence Authentication Ahto Buldas, Risto Laanoja, and Ahto Truu GuardTime AS, Tammsaare tee 60, 11316 Tallinn, Estonia. Abstract. We present new ideas for decre

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-09-03 05:03:49
825Geometry / Locality-sensitive hashing / Hash function / Hash table / Hamming distance / Nearest neighbor search / Search algorithms / Information science / Information retrieval

The Power of Asymmetry in Binary Hashing Behnam Neyshabur Payman Yadollahpour Yury Makarychev Toyota Technological Institute at Chicago

Add to Reading List

Source URL: www.cs.toronto.edu

Language: English - Date: 2013-11-19 21:18:20
826Hashing / Merkle–Damgård construction / Hash function / Collision resistance / Crypt / Block cipher / Information retrieval / Computing / Artificial intelligence / Cryptographic hash functions / Cryptography / Search algorithms

X-Sieve: CMU Sieve 2.2 Date: Tue, 13 Mar 2007 01:50:24 +0100 (CET) From: Orr Dunkelman To: hash-function@nist.gov Subject: A comment to NIST regarding the Hash function Competition X-Viru

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:58:52
827Search algorithms / Natural language processing / Information retrieval / Machine learning / Numerical analysis / Locality-sensitive hashing / Hellinger distance / Nearest neighbor search / Kullback–Leibler divergence / Statistics / Information science / Geometry

Efficient Nearest-Neighbor Search in the Probability Simplex Kriste Krstovski David A. Smith

Add to Reading List

Source URL: www.ccs.neu.edu

Language: English - Date: 2013-09-16 13:42:18
828Hashing / SHA-2 / SHA-1 / Search algorithms / Crypt / Secure Hash Standard / NIST hash function competition / Collision attack / HMAC / Error detection and correction / Cryptography / Cryptographic hash functions

[Federal Register: September 12, 1997 (Volume 62, Number 177)]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:13:28
829Keccak / Hashing / Block ciphers / Joan Daemen / Threefish / Skein / Fugue / Bart Preneel / Crypt / Cryptography / NIST hash function competition / Cryptographic hash functions

The Second SHA-3 Candidate Conference Accepted Papers

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-30 12:50:30
830Message authentication codes / HMAC / Internet protocols / Cryptographic hash functions / Cryptographic protocols / Collision attack / MD4 / MD5 / SHA-1 / Cryptography / Error detection and correction / Hashing

Forgery and Partial Key Recovery attacks on HMAC and NMAC using Hash Collisions 2nd NIST Hash Function Workshop Scott Contini Macquarie University

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:27:16
UPDATE