<--- Back to Details
First PageDocument Content
Hashing / Artificial intelligence / Information retrieval / Hash function / Hash table / MD5 / Collision / Provably secure cryptographic hash function / Elliptic curve only hash / Cryptographic hash functions / Cryptography / Search algorithms
Date: 2012-12-31 14:07:22
Hashing
Artificial intelligence
Information retrieval
Hash function
Hash table
MD5
Collision
Provably secure cryptographic hash function
Elliptic curve only hash
Cryptographic hash functions
Cryptography
Search algorithms

Time-memory Trade-offs for Near-collisions Gaëtan Leurent UCL Crypto Group Abstract. In this work we consider generic algorithms to find near-collisions for a hash

Add to Reading List

Source URL: eprint.iacr.org

Download Document from Source Website

File Size: 100,29 KB

Share Document on Facebook

Similar Documents

PROJECT PAI  TECHNICAL WHITEPAPER SUMMARY PAI BLOCKCHAIN PROTOCOL: A DECENTRALIZED ARTIFICIAL INTELLIGENCE NETWORK

PROJECT PAI TECHNICAL WHITEPAPER SUMMARY PAI BLOCKCHAIN PROTOCOL: A DECENTRALIZED ARTIFICIAL INTELLIGENCE NETWORK

DocID: 1xVWW - View Document

Persistent Memory for Artificial Intelligence Bill Gervasi Principal Systems Architect  Santa Clara, CA

Persistent Memory for Artificial Intelligence Bill Gervasi Principal Systems Architect Santa Clara, CA

DocID: 1xVOm - View Document

Journal of Machine Learning Research, 4th International Conference on Predictive Applications and APIs  Marvin - Open source artificial intelligence platform Lucas B. Miguel

Journal of Machine Learning Research, 4th International Conference on Predictive Applications and APIs Marvin - Open source artificial intelligence platform Lucas B. Miguel

DocID: 1xVLb - View Document

Cybersecurity Powered by Artificial Intelligence and the Blockchain HEROIC.com Team February 2018

Cybersecurity Powered by Artificial Intelligence and the Blockchain HEROIC.com Team February 2018

DocID: 1xVHi - View Document