MMH-Badger MAC

Results: 10



#Item
1Factorial / Number theory / MMH-Badger MAC / Mathematics / Mathematical analysis / Combinatorics

(ϵ, δ)-Estimators: How to count very efficiently up to n MSC - CR01 - Randomness in Science Lecture 3 by Nicolas Schabanel Jan 9, 2014

Add to Reading List

Source URL: www.liafa.univ-paris-diderot.fr

Language: English - Date: 2015-01-19 07:51:43
2Computational geometry / Ε-net / Convex geometry / Order theory / MMH-Badger MAC / Topology / General topology / Mathematics

CCCG 2010, Winnipeg MB, August 9–11, 2010 Small Strong Epsilon Nets Pradeesha Ashok∗ Sathish Govindarajan†

Add to Reading List

Source URL: cccg.ca

Language: English - Date: 2010-07-19 10:46:17
3Message authentication codes / Cryptographic hash functions / Stream ciphers / Keystream / Universal hashing / Hash function / MMH-Badger MAC / Cryptography / Hashing / Search algorithms

A Forgery Attack on the Candidate LTE Integrity Algorithm 128-EIA3 (updated version) Thomas Fuhr, Henri Gilbert, Jean-René Reinhard, and Marion Videau ANSSI, France

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-12-02 17:52:59
4Artificial intelligence / Universal hashing / Applied mathematics / Hash function / Tabulation hashing / MMH-Badger MAC / Search algorithms / Hashing / Information retrieval

Lecture 9, ThursdayChoosing Hash Functions O Mostly black magic…

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2001-05-09 22:04:03
5Search algorithms / Cryptographic hash functions / Galois/Counter Mode / Universal hashing / Hash function / MMH-Badger MAC / Cryptography / Hashing / Message authentication codes

Galois MAC with forgery probability close to ideal

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-05 14:16:52
6MMH-Badger MAC / Approximation algorithm / Computational complexity theory / Harris chain

Computing optimal contracts in combinatorial agencies

Add to Reading List

Source URL: www.tik.ee.ethz.ch

Language: English - Date: 2013-05-02 13:59:16
7Initialization vector / Cipher / Py / Rabbit / Crypt / MMH-Badger MAC / Cryptography / Stream ciphers / Block cipher modes of operation

Rabbit Stream Cipher, Algorithm Specification May 12, 2005

Add to Reading List

Source URL: www.cryptico.com

Language: English - Date: 2011-07-07 16:04:52
8Search algorithms / Error detection and correction / Message authentication codes / Artificial intelligence / Information retrieval / Hash function / Universal hashing / UMAC / MMH-Badger MAC / Hashing / Cryptographic hash functions / Cryptography

PDF Document

Add to Reading List

Source URL: www.erikzenner.name

Language: English - Date: 2008-11-24 08:44:36
9Post-quantum cryptography / Cryptographic hash functions / MMH-Badger MAC / Cryptography / One-time pad / Message authentication codes

PDF Document

Add to Reading List

Source URL: web.mit.edu

Language: English - Date: 1997-12-09 04:34:39
10HMAC / Cryptography / Science / Mathematical sciences / Applied mathematics / MMH-Badger MAC / Message authentication codes / UMAC / Cryptographic hash function

PDF Document

Add to Reading List

Source URL: fastcrypto.org

Language: English - Date: 2013-06-21 14:01:34
UPDATE