Hashing

Results: 1317



#Item
941Computing / Hashing / MD5 / Suppression list / Search algorithms / Crypt / SHA-1 / SHA-2 / Hash function / Cryptographic hash functions / Cryptography / Email

Microsoft Word - MD5 Suppression List Encryption final[removed]doc

Add to Reading List

Source URL: www.espcoalition.org

Language: English - Date: 2009-04-22 18:33:13
942Search algorithms / Information science / Database management systems / Database theory / Sorting algorithms / Consistent hashing / Hash function / Database / Replication / Data management / Hashing / Computing

CRUSH: Controlled, Scalable, Decentralized Placement of Replicated Data Sage A. Weil Scott A. Brandt Ethan L. Miller Storage Systems Research Center

Add to Reading List

Source URL: ceph.com

Language: English - Date: 2012-05-21 15:44:46
943Crypt / Cryptographic hash functions / Computing / Applied mathematics / Cyberwarfare / Cryptography / Hashing / MD5

Wang’s sufficient conditions of MD5 are not sufficient Jun Yajima and Takeshi Shimoyama FUJITSU LABORATORIES LTD. {jyajima,shimo}@labs.fujitsu.com Abstract

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-08-10 09:35:42
944MD5 / Hashing / Collision attack / SHA-1 / X.509 / Padding / Preimage attack / Hash function / Birthday attack / Cryptography / Error detection and correction / Cryptographic hash functions

Chosen-prefix Collisions for MD5 and Colliding X.509 Certificates for Different Identities Marc Stevens1 , Arjen Lenstra2 , and Benne de Weger1 1 TU Eindhoven, Faculty of Mathematics and Computer Science

Add to Reading List

Source URL: www.win.tue.nl

Language: English - Date: 2007-02-27 05:15:12
945Finite fields / Hashing / Galois/Counter Mode / CBC-MAC / Cryptographic hash function / Block cipher / Authenticated encryption / CMAC / Initialization vector / Message authentication codes / Cryptography / Block cipher modes of operation

Efficient authentication of large, dynamic data sets using Galois/Counter Mode (GCM) David McGrew Cisco Systems, Inc. 510 McCarthy Blvd.. Milpitas, CA 95035

Add to Reading List

Source URL: www.mindspring.com

Language: English - Date: 2007-11-12 15:26:12
946Information science / Artificial intelligence / Tabulation hashing / Hash table / Linear probing / Cuckoo hashing / Hash function / Universal hashing / Double hashing / Hashing / Search algorithms / Information retrieval

6.897: Advanced Data Structures Spring 2012 Lecture 10 — March 20, 2012 Scribe: Edward Z. Yang (2012),

Add to Reading List

Source URL: courses.csail.mit.edu

Language: English - Date: 2012-05-29 21:33:37
947Search algorithms / Coding theory / Error detection and correction / Computer arithmetic / Dimension reduction / Locality-sensitive hashing / Eigenvalues and eigenvectors / Nearest neighbor search / Hamming / Mathematics / Information science / Mathematical analysis

Spectral Hashing 3 Yair Weiss1,3 School of Computer Science,

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2009-02-10 02:03:47
948Computing / Cryptographic hash functions / Hashing / SHA-2 / Bouncy Castle / HMAC / SHA-1 / IPsec / Secure Hash Standard / Cryptography / Cryptographic software / Error detection and correction

Bouncy Castle FIPS Java API 4 May[removed]Introduction The Bouncy Castle APIs (BC) divide into 3 groups: there is a light-weight API which provides direct

Add to Reading List

Source URL: www.bouncycastle.org

Language: English - Date: 2014-05-14 07:46:41
949Computing / Information / Data / Oram / CPU cache / Hash list / Hash tree / Hash function / Trie / Hashing / Error detection and correction / Cryptographic hash functions

1 Integrity Verification for Path Oblivious-RAM Ling Ren, Christopher W. Fletcher , Xiangyao Yu, Marten van Dijk and Srinivas Devadas MIT CSAIL, Cambridge, MA, USA {renling, cwfletch, yxy, marten, devadas}@mit.edu

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2013-08-04 20:04:19
950MD5 / Search algorithms / Collision attack / Hash function / Padding / SHA-1 / Merkle–Damgård construction / Cryptography / Cryptographic hash functions / Hashing

Single-block collision attack on MD5 Marc Stevens Cryptology Group, CWI P.O. Box 94079, NL-1090 GB Amsterdam, The Netherlands [removed] January 29, 2012

Add to Reading List

Source URL: marc-stevens.nl

Language: English - Date: 2012-01-29 17:12:55
UPDATE