Universal hashing

Results: 119



#Item
11AEZ v4.1: Authenticated Encryption by Enciphering Viet Tung Hoang UC Santa Barbara   Ted Krovetz

AEZ v4.1: Authenticated Encryption by Enciphering Viet Tung Hoang UC Santa Barbara Ted Krovetz

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2015-10-15 15:27:48
12Microsoft PowerPoint - lecture7_HashingIII.pptx

Microsoft PowerPoint - lecture7_HashingIII.pptx

Add to Reading List

Source URL: courses.csail.mit.edu

Language: English - Date: 2011-03-31 12:24:54
13October 17, Fall 2007 Quiz 1 Solutions Introduction to Algorithms Massachusetts Institute of Technology

October 17, Fall 2007 Quiz 1 Solutions Introduction to Algorithms Massachusetts Institute of Technology

Add to Reading List

Source URL: courses.csail.mit.edu

Language: English - Date: 2009-05-07 21:09:16
146.006 Intro to Algorithms  Recitation 07 February 25, 2011

6.006 Intro to Algorithms Recitation 07 February 25, 2011

Add to Reading List

Source URL: courses.csail.mit.edu

Language: English - Date: 2011-02-25 14:33:37
15STRONGER KEY DERIVATION VIA SEQUENTIAL MEMORY-HARD FUNCTIONS COLIN PERCIVAL Abstract. We introduce the concepts of memory-hard algorithms and sequential memory-hard functions, and argue that in order for key derivation f

STRONGER KEY DERIVATION VIA SEQUENTIAL MEMORY-HARD FUNCTIONS COLIN PERCIVAL Abstract. We introduce the concepts of memory-hard algorithms and sequential memory-hard functions, and argue that in order for key derivation f

Add to Reading List

Source URL: www.daemonology.net

Language: English - Date: 2009-06-11 07:29:01
16Introduction  MD New Results I

Introduction MD New Results I

Add to Reading List

Source URL: www.hyperelliptic.org

Language: English - Date: 2008-09-27 14:59:29
17How to Time-Stamp a Digital Document Stuart Haber  W. Scott Stornetta

How to Time-Stamp a Digital Document Stuart Haber W. Scott Stornetta

Add to Reading List

Source URL: www.anf.es

Language: English - Date: 2014-05-12 07:16:17
18Universal Hashing for Ultra-Low-Power Cryptographic Hardware Applications by Kaan Y¨ uksel

Universal Hashing for Ultra-Low-Power Cryptographic Hardware Applications by Kaan Y¨ uksel

Add to Reading List

Source URL: www.wpi.edu

Language: English - Date: 2004-04-28 19:59:50
    19Compressive sensing using locality-preserving matrices Elyot Grant∗ Piotr Indyk∗  December 4, 2012

    Compressive sensing using locality-preserving matrices Elyot Grant∗ Piotr Indyk∗ December 4, 2012

    Add to Reading List

    Source URL: people.csail.mit.edu

    Language: English - Date: 2013-06-10 19:22:49
    20A Scalable and Nearly Uniform Generator of SAT Witnesses? Supratik Chakraborty1 , Kuldeep S. Meel2 , and Moshe Y. Vardi2 1  2

    A Scalable and Nearly Uniform Generator of SAT Witnesses? Supratik Chakraborty1 , Kuldeep S. Meel2 , and Moshe Y. Vardi2 1 2

    Add to Reading List

    Source URL: www.cs.rice.edu

    Language: English - Date: 2013-07-17 18:10:56