Cryptographic hash function

Results: 1121



#Item
111Large Scale Machine Learning

Large Scale Machine Learning

Add to Reading List

Source URL: www.sanjivk.com

Language: English - Date: 2010-10-12 11:05:04
112Chapter 11 - Developing Software for the Xbox  cheaper than a Powerball ticket. Another approach, related to cracking the RSA-2048 bit key, is to modify an existing, signed Xbox executable in a useful manner without chan

Chapter 11 - Developing Software for the Xbox cheaper than a Powerball ticket. Another approach, related to cracking the RSA-2048 bit key, is to modify an existing, signed Xbox executable in a useful manner without chan

Add to Reading List

Source URL: www.xenatera.com

Language: English - Date: 2003-04-17 04:53:36
113TRV1Electronic Signatures and Infrastructures (ESI); Business guidance on cryptographic suites

TRV1Electronic Signatures and Infrastructures (ESI); Business guidance on cryptographic suites

Add to Reading List

Source URL: www.etsi.org

Language: English - Date: 2015-05-12 09:17:43
114Swedish Certification Body for IT Security  Certification Report - Filkrypto 1.0 Issue: 1.0, 2007-Oct-05 Responsible: Anders Staaf

Swedish Certification Body for IT Security Certification Report - Filkrypto 1.0 Issue: 1.0, 2007-Oct-05 Responsible: Anders Staaf

Add to Reading List

Source URL: www.tutus.se

Language: English - Date: 2015-07-12 19:16:51
115Supplementary Material for “Compact Hyperplane Hashing with Bilinear Functions” Wei Liu†  Jun Wang‡

Supplementary Material for “Compact Hyperplane Hashing with Bilinear Functions” Wei Liu† Jun Wang‡

Add to Reading List

Source URL: www.sanjivk.com

Language: English - Date: 2012-06-12 10:11:42
116CS140 Operating Systems and Systems Programming Final Exam December 12, 2005 Name: (please print)______________________________ In recognition of and in the spirit of the Stanford University Honor Code, I certify

CS140 Operating Systems and Systems Programming Final Exam December 12, 2005 Name: (please print)______________________________ In recognition of and in the spirit of the Stanford University Honor Code, I certify

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2009-12-29 17:31:12
117SimHash: Hash-based Similarity Detection Caitlin Sadowski University of California, Santa Cruz   Greg Levin

SimHash: Hash-based Similarity Detection Caitlin Sadowski University of California, Santa Cruz Greg Levin

Add to Reading List

Source URL: simhash.googlecode.com

Language: English - Date: 2007-12-13 05:28:46
118Hash Tables: Linear Probing Uri Zwick Tel Aviv University  Hashing with open addressing

Hash Tables: Linear Probing Uri Zwick Tel Aviv University Hashing with open addressing

Add to Reading List

Source URL: www.cs.tau.ac.il

Language: English - Date: 2015-05-10 09:08:35
119Winnowing: Local Algorithms for Document Fingerprinting Saul Schleimer Daniel S. Wilkerson  Alex Aiken

Winnowing: Local Algorithms for Document Fingerprinting Saul Schleimer Daniel S. Wilkerson Alex Aiken

Add to Reading List

Source URL: dsw.users.sonic.net

Language: English - Date: 2015-06-08 15:50:28
120Overview  Bitcoin Problems with Bitcoin?

Overview Bitcoin Problems with Bitcoin?

Add to Reading List

Source URL: www.cs.technion.ac.il

Language: English - Date: 2014-10-22 02:47:23