Hashing

Results: 1317



#Item
911NIST hash function competition / MD6 / Hashing / SHA-2 / Crypt / Ron Rivest / Error detection and correction / Cryptography / Cryptographic hash functions

Microsoft Office Outlook - Memo Style

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-07 14:16:36
912Cryptography / Hash function / Information retrieval / SHA-2 / NIST hash function competition / Collision / Artificial intelligence / Computing / Cryptographic hash functions / Hashing / Search algorithms

OFFICIAL COMMENT:DynamicSHA2

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-07 13:41:26
913Hashing / Error detection and correction / SHA-2 / Debian / Electronic voting / Hash function / Software / Certification of voting machines / Digital signature / Cryptography / Cryptographic hash functions / Election technology

DRAFT Pre-Decisional Material March 2, 2005 DRAFT

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2010-09-28 15:20:14
914Computer programming / Computing / Bloom filter / Hashing / MD5

Revisiting Bloom Filters Payload attribution via Hierarchiecal Bloom Filters Kulesh Shanmugasundaram, Herve Bronnimann, Nasir Memon[removed]Advanced Network Security

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2008-08-14 14:22:10
915Security / Cryptographic hash functions / Hashing / Information society / Premier Election Solutions / SHA-1 / HMAC / Voting machine / Optical scan voting system / Politics / Error detection and correction / Electronic voting

Microsoft Word - Florida Dec 2007 Review Response final.doc

Add to Reading List

Source URL: election.dos.state.fl.us

Language: English - Date: 2008-03-19 09:20:28
916Cryptography / Health informatics / Information science / Electronic health record / SHA-1 / Hash function / Information / Computing / Hash list / Cryptographic hash functions / Hashing / Error detection and correction

Test Procedure for §[removed]s Integrity APPROVED Version 1.0  August 13, 2010 Test Procedure for §[removed]s) Integrity This document describes the draft test procedure for evaluating conformance of complete EHRs or

Add to Reading List

Source URL: healthcare.nist.gov

Language: English - Date: 2010-08-13 13:13:32
917Search algorithms / Searching / B-tree / Dimension reduction / Locality-sensitive hashing / Nearest neighbor search / R-tree / B+ tree / Binary tree / Information science / Information retrieval / Information

LSH Forest: Self-Tuning Indexes for Similarity Search Mayank Bawa Tyson Condie Prasanna Ganesan

Add to Reading List

Source URL: www2005.org

Language: English - Date: 2005-03-31 08:54:55
918Information science / Bloom filter / Artificial intelligence / Hash function / Bit array / Cryptographic hash function / Hashing / Search algorithms / Information retrieval

Duplicate Detection in Click Streams ∗ † Ahmed Metwally Divyakant Agrawal Amr El Abbadi

Add to Reading List

Source URL: www2005.org

Language: English - Date: 2005-03-31 03:06:08
919Electronic voting / Information society / Validation / Software development process / FIPS 140-2 / Debian / Cryptographic hash function / Computing / Science / Software / Hashing

Draft Recommendations for Software Distribution and Setup Validation: Augmenting the 2002 Voting Systems Standard Nelson Hastings National Institute of Standards and Technology

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2010-09-28 15:04:16
920Hashing / BLAKE / Opteron / Advanced Micro Devices / MD6 / Computing / Computer programming / Applied mathematics / Cryptographic hash functions / NIST hash function competition / SHA-2

Microsoft Office Outlook - Memo Style

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-30 12:11:44
UPDATE