N-Hash

Results: 65



#Item
51Cuisine of the Southern United States / Italian-American cuisine / Submarine sandwich / Chili con carne / Sandwich wrap / Soup / Food and drink / Sandwiches / Stews

Cafe Menu - Weekly Specials Monday[removed]Rise `N Dine 2 eggs, 1 meat, hash brown,

Add to Reading List

Source URL: www.riamwr.com

Language: English - Date: 2014-07-28 14:27:09
52Chorizo / Biscuit / French toast / Breakfast / Sausage / Hash / Omelette / Bacon / Full breakfast / Food and drink / Breakfast foods / Pancake

R E S T A U R A N T 8 a.m. - 2:00 p.m. Wednesday - Sunday[removed]

Add to Reading List

Source URL: www.sanbornsbreakfast.com

Language: English - Date: 2013-01-07 12:59:15
53Cryptographic hash functions / Stream ciphers / Cryptographic primitive / Symmetric-key algorithm / Block cipher / Key size / Public-key cryptography / Crypt / VEST / Cryptography / Cryptography standards / CRYPTREC

Guidance for Submissions in[removed]Provisional Translation) I n f o r m a t i o n - t e c h n o l o g y P r o m o t i o n A g e n c y, J a p a n Telecommunications Advancement Organization of Japan

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-19 04:38:45
54K1 / Tiny Encryption Algorithm / Block cipher / NIST hash function competition / Hash function / Merkle–Damgård construction / N-Hash / Cryptography / Cryptographic hash functions / Keccak

A Keyed Sponge Construction with Pseudorandomness in the Standard Model

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-21 15:25:42
55Fowler–Noll–Vo hash function / Mathematics / Landon Curt Noll / Cryptographic hash function / Hash functions / Cryptography / Error detection and correction

Generating Locally Unique point-2-point N_Port_IDs The Caffè Corretto version Landon Curt Noll T11/10-137v1

Add to Reading List

Source URL: www.t11.org

Language: English - Date: 2010-06-09 12:24:02
56

´ n, a belt-and-mill hash Errata — RadioGatu function Guido Bertoni, Joan Daemen, Micha¨el Peeters and Gilles Van Assche[removed] ´n, a beltThis document lists the known errors in the paper RadioGatu

Add to Reading List

Source URL: radiogatun.noekeon.org

- Date: 2013-02-27 15:27:44
    57Hash function / Collision resistance / MD5 / SHA-1 / Differential cryptanalysis / MD4 / Block cipher / SHA-2 / Preimage attack / Cryptographic hash functions / Error detection and correction / Cryptography

    ´ n, a belt-and-mill hash function RadioGatu Guido Bertoni, Joan Daemen, Gilles Van Assche STMicroelectronics Micha¨el Peeters

    Add to Reading List

    Source URL: radiogatun.noekeon.org

    Language: English - Date: 2013-02-27 15:27:44
    58One-way compression function / MD5 / Preimage attack / SHA-2 / SHA-1 / Merkle–Damgård construction / Collision attack / N-Hash / Birthday attack / Cryptography / Cryptographic hash functions / Error detection and correction

    Microsoft PowerPoint - preneel_hash_tools_2012v2.ppt

    Add to Reading List

    Source URL: homes.esat.kuleuven.be

    Language: English - Date: 2012-05-31 19:52:41
    59Vector space model / Learning to rank / Ranking SVM / Tf*idf / Hash function / Search engine indexing / N-gram / Supervised learning / Latent semantic indexing / Information science / Information retrieval / Science

    Noname manuscript No. (will be inserted by the editor) Learning to Rank with (a Lot of ) Word Features Bing Bai · Jason Weston · David Grangier · Ronan Collobert · Kunihiko Sadamasa ·

    Add to Reading List

    Source URL: david.grangier.info

    Language: English - Date: 2010-12-15 14:12:01
    60Information theory / Key management / Random number generation / Hardware random number generator / Entropy / Pseudorandomness / Key / Cryptographic hash function / MD5 / Cryptography / Randomness / Pseudorandom number generators

    R S A L A B O R A T O R I E S B U L L E T I N

    Add to Reading List

    Source URL: www.storage.jak-stik.ac.id

    Language: English - Date: 2000-03-07 12:00:00
    UPDATE