Hashing

Results: 1317



#Item
881Concurrent computing / Chord / Freenet / Distributed hash table / Crowds / Peer-to-peer / Degree of anonymity / Cache / Consistent hashing / Distributed data storage / Software / Computing

Information Leak in the Chord Lookup Protocol Charles W. O’Donnell and Vinod Vaikuntanathan MIT Computer Science and Artificial Intelligence Laboratory Cambridge, MA 02139, USA {cwo,vinodv}@mit.edu Abstract

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2010-02-04 10:27:55
882Error detection and correction / Search algorithms / Hash function / Hash tree / Hash list / SHA-1 / SHA-2 / Trie / Hash chain / Cryptographic hash functions / Cryptography / Hashing

Efficient Record-Level Keyless Signatures for Audit Logs Ahto Buldas1 , Ahto Truu1 , Risto Laanoja1 , and Rainer Gerhards2 1 Guardtime AS, Tallinn, Estonia {ahto.buldas,ahto.truu,risto.laanoja}@guardtime.com

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-07-15 10:18:50
883Error detection and correction / Cryptographic hash functions / Fault-tolerant computer systems / Software / Bitcoin / Hash tree / Proof-of-work system / Consensus / Peer-to-peer / Computing / Cryptography / Hashing

Filecoin: A Cryptocurrency Operated File Storage Network 1e96a1b27a6cb85df68d728cf3695b0c46dbd44d filecoin.io July 15, 2014 Abstract Filecoin is a distributed electronic currency similar to Bitcoin. Unlike Bitcoin’s co

Add to Reading List

Source URL: filecoin.io

Language: English - Date: 2014-07-18 23:17:17
884Cryptography / Search algorithms / Image processing / Cryptographic hash functions / Watermark / Watermarking / Hash function / Singular value decomposition / JPEG / Algebra / Mathematics / Hashing

Appl. Math. Inf. Sci. 6 No. 2S pp. 643S-650S[removed]Applied Mathematics & Information Sciences An International Journal © 2012 NSP

Add to Reading List

Source URL: www.naturalspublishing.com

Language: English - Date: 2013-04-02 22:57:06
885Bloom filter / Search engine indexing / Hash function / RSA / Information science / Information retrieval / Hashing

A Conjunction, Language, and System Facets for Private Packet Filtering Michael Oehler, Dhananjay S. Phatak, and Alan T. Sherman Cyber Defense Lab Department of Computer Science and Electrical Engineering University of M

Add to Reading List

Source URL: www.cisa.umbc.edu

Language: English - Date: 2014-01-18 12:30:58
886Learning with errors / RSA / Ideal lattice cryptography / Index of cryptography articles / Cryptography / Cryptographic protocols / Password-authenticated key agreement

Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices Jonathan Katz1? and Vinod Vaikuntanathan2 1 University of Maryland

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2010-02-04 10:06:47
887Hashing / Bucket / Search algorithms / Technology

BUCKET OF JUNK COMPETITION Entry Form Deadline: July 1, 2014 Entry Fee: $20/team Entry Arrival: Sculpture must be in place by 9:00 a.m. on Monday, August 25, Horticulture

Add to Reading List

Source URL: www.nysfair.org

Language: English - Date: 2014-04-01 11:26:33
888Error detection and correction / HTTP clients / Hashing / Hash list / SHA-1 / Wget / CURL / Hash function / Metalink / Software / Computing / Cryptographic hash functions

Package ‘downloader’ July 2, 2014 Maintainer Winston Chang Author Winston Chang Version 0.3 License GPL-2

Add to Reading List

Source URL: cran.r-project.org

Language: English - Date: 2014-07-02 11:40:07
889Message authentication codes / Cryptographic hash functions / HMAC / Internet protocols / HOTP / SHA-1 / MD5 / SHA-2 / Collision attack / Cryptography / Error detection and correction / Hashing

Attacks on SHA-1 Attacks on SHA-1 Initiative for Open AuTHentication

Add to Reading List

Source URL: www.openauthentication.org

Language: English - Date: 2013-11-05 02:31:08
890Message authentication codes / Cryptographic hash functions / Internet protocols / HMAC / HOTP / SHA-1 / Collision attack / Hash function / Wang Xiaoyun / Cryptography / Error detection and correction / Hashing

SHA-1 & HMAC OTP Frequently Asked Questions Recently, there has been considerable coverage in the press about an upcoming paper from Academics in China that describes an attack on SHA-1. OATH is providing this overview a

Add to Reading List

Source URL: www.openauthentication.org

Language: English - Date: 2013-11-05 02:27:57
UPDATE