<--- Back to Details
First PageDocument Content
Applied mathematics / Hashing / Cryptographic hash functions / Analysis of algorithms / Universal hashing / Hash table / Hash function / Parallel Random Access Machine / NC / Theoretical computer science / Search algorithms / Computational complexity theory
Date: 2009-04-03 14:08:37
Applied mathematics
Hashing
Cryptographic hash functions
Analysis of algorithms
Universal hashing
Hash table
Hash function
Parallel Random Access Machine
NC
Theoretical computer science
Search algorithms
Computational complexity theory

Add to Reading List

Source URL: www.unclaw.com

Download Document from Source Website

File Size: 694,85 KB

Share Document on Facebook

Similar Documents

Cryptographic Hash Functions Part II Cryptography 1 Andreas Hülsing, TU/e Some slides by Sebastiaan de Hoogh, TU/e

DocID: 1uAoQ - View Document

How to Break MD5 and Other Hash Functions Xiaoyun Wang and Hongbo Yu Shandong University, Jinan, China, , Abstract. MD5 is one of the most widely used cryptographic hash funct

DocID: 1uyAd - View Document

Cryptographic Hash Functions Part I Cryptography 1 Andreas Hülsing, TU/e Based on slides by Sebastiaan de Hoogh, TU/e

DocID: 1tYRg - View Document

Cryptography / Cryptographic hash functions / SHA-2 / Twofish / Encryption / Secure voice / Public switched telephone network / Crypt

GSMK CryptoPhone PSTN/1 Secure PSTN Landline Telephone TECHNICAL SPECIFICATIONS Telephone Line Interface Standard analog PSTN/POTS interface with

DocID: 1rud6 - View Document