Hashing

Results: 1317



#Item
941Microsoft Word - MD5 Suppression List Encryption final[removed]doc

Microsoft Word - MD5 Suppression List Encryption final[removed]doc

Add to Reading List

Source URL: www.espcoalition.org

Language: English - Date: 2009-04-22 18:33:13
942CRUSH: Controlled, Scalable, Decentralized Placement of Replicated Data Sage A. Weil Scott A. Brandt Ethan L. Miller Storage Systems Research Center

CRUSH: Controlled, Scalable, Decentralized Placement of Replicated Data Sage A. Weil Scott A. Brandt Ethan L. Miller Storage Systems Research Center

Add to Reading List

Source URL: ceph.com

Language: English - Date: 2012-05-21 15:44:46
943Wang’s sufficient conditions of MD5 are not sufficient Jun Yajima and Takeshi Shimoyama FUJITSU LABORATORIES LTD. {jyajima,shimo}@labs.fujitsu.com  Abstract

Wang’s sufficient conditions of MD5 are not sufficient Jun Yajima and Takeshi Shimoyama FUJITSU LABORATORIES LTD. {jyajima,shimo}@labs.fujitsu.com Abstract

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-08-10 09:35:42
944Chosen-prefix Collisions for MD5 and Colliding X.509 Certificates for Different Identities Marc Stevens1 , Arjen Lenstra2 , and Benne de Weger1 1  TU Eindhoven, Faculty of Mathematics and Computer Science

Chosen-prefix Collisions for MD5 and Colliding X.509 Certificates for Different Identities Marc Stevens1 , Arjen Lenstra2 , and Benne de Weger1 1 TU Eindhoven, Faculty of Mathematics and Computer Science

Add to Reading List

Source URL: www.win.tue.nl

Language: English - Date: 2007-02-27 05:15:12
945Efficient authentication of large, dynamic data sets using Galois/Counter Mode (GCM) David McGrew Cisco Systems, Inc. 510 McCarthy Blvd.. Milpitas, CA 95035

Efficient authentication of large, dynamic data sets using Galois/Counter Mode (GCM) David McGrew Cisco Systems, Inc. 510 McCarthy Blvd.. Milpitas, CA 95035

Add to Reading List

Source URL: www.mindspring.com

Language: English - Date: 2007-11-12 15:26:12
9466.897: Advanced Data Structures  Spring 2012 Lecture 10 — March 20, 2012 Scribe: Edward Z. Yang (2012),

6.897: Advanced Data Structures Spring 2012 Lecture 10 — March 20, 2012 Scribe: Edward Z. Yang (2012),

Add to Reading List

Source URL: courses.csail.mit.edu

Language: English - Date: 2012-05-29 21:33:37
947Spectral Hashing  3 Yair Weiss1,3 School of Computer Science,

Spectral Hashing 3 Yair Weiss1,3 School of Computer Science,

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2009-02-10 02:03:47
948Bouncy Castle FIPS Java API  4 May[removed]Introduction The Bouncy Castle APIs (BC) divide into 3 groups: there is a light-weight API which provides direct

Bouncy Castle FIPS Java API 4 May[removed]Introduction The Bouncy Castle APIs (BC) divide into 3 groups: there is a light-weight API which provides direct

Add to Reading List

Source URL: www.bouncycastle.org

Language: English - Date: 2014-05-14 07:46:41
9491  Integrity Verification for Path Oblivious-RAM Ling Ren, Christopher W. Fletcher , Xiangyao Yu, Marten van Dijk and Srinivas Devadas MIT CSAIL, Cambridge, MA, USA {renling, cwfletch, yxy, marten, devadas}@mit.edu

1 Integrity Verification for Path Oblivious-RAM Ling Ren, Christopher W. Fletcher , Xiangyao Yu, Marten van Dijk and Srinivas Devadas MIT CSAIL, Cambridge, MA, USA {renling, cwfletch, yxy, marten, devadas}@mit.edu

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2013-08-04 20:04:19
950Single-block collision attack on MD5 Marc Stevens Cryptology Group, CWI P.O. Box 94079, NL-1090 GB Amsterdam, The Netherlands [removed] January 29, 2012

Single-block collision attack on MD5 Marc Stevens Cryptology Group, CWI P.O. Box 94079, NL-1090 GB Amsterdam, The Netherlands [removed] January 29, 2012

Add to Reading List

Source URL: marc-stevens.nl

Language: English - Date: 2012-01-29 17:12:55