Cryptographic hash function

Results: 1121



#Item
121Hashing / Computing / Information retrieval / Cryptography / Causality / Version vector / Hash table / Hash function / SHA-1 / Search algorithms / Mathematics / Cryptographic hash functions

Appears in Proceedings of the 23rd IEEE International Conference on Distributed Computing Systems (ICDCS ’03). The Hash History Approach for Reconciling Mutual Inconsistency Brent ByungHoon Kang, Robert Wilensky and J

Add to Reading List

Source URL: oceanstore.cs.berkeley.edu

Language: English - Date: 2003-03-13 15:50:35
122Computer programming / Abstract data types / Data types / Information retrieval / Cryptographic hash functions / Hash table / Hash function / Associative array / Bit array / Search algorithms / Computing / Hashing

BRICS Basic Research in Computer Science BRICS RSPagh & Rodler: Lossy Dictionaries Lossy Dictionaries

Add to Reading List

Source URL: www.brics.dk

Language: English - Date: 2001-09-06 08:24:05
123

A Document describing all modifications made on the Blue Midnight Wish cryptographic hash function before entering the Second Round of SHA-3 hash competition Danilo Gligoroski1 and Vlastimil Klima2 1

Add to Reading List

Source URL: people.item.ntnu.no

Language: English - Date: 2009-09-10 06:56:48
    124

    Cryptographic Hash Function B LUE M IDNIGHT W ISH Norwegian University of Science and Technology Trondheim, Norway

    Add to Reading List

    Source URL: cryptography.hyperlink.cz

    Language: English - Date: 2008-11-19 04:27:41
      125Information science / Artificial intelligence / Hash table / Hash function / Cuckoo hashing / Cryptographic hash function / Double hashing / Linear probing / Java hashCode() / Hashing / Search algorithms / Information retrieval

      Foundations of computing: Algorithms and Data Structures Rasmus Pagh September 29,

      Add to Reading List

      Source URL: itu.dk

      Language: English - Date: 2011-09-29 12:23:33
      126Computer programming / MD5 / SHA-1 / SHA-2 / MD4 / ALGOL 68 / Struct / Hash function / Whirlpool / Cryptographic hash functions / Cryptography / Computing

      Christian Grothoff COMP 3704 Computer Security Christian Grothoff

      Add to Reading List

      Source URL: grothoff.org

      Language: English - Date: 2011-06-21 07:45:47
      127Post-quantum cryptography / Error detection and correction / Cryptographic hash function / Merkle signature scheme / Digital signature / Hash function / Cryptography / Public-key cryptography / Hashing

      draft-irtf-cfrg-xmss-hash-based-signatures-00 - XMSS: Extended Hash-Based Signatures

      Add to Reading List

      Source URL: tools.ietf.org

      Language: English - Date: 2015-04-08 10:22:54
      128Cryptographic protocol / ASP.NET / Cryptographic hash function / Symmetric-key algorithm / Computer security / Key / Cryptography / Security / Cryptographic primitive

      SECURITY DRIVEN .NET .NET/ASP.NET 4.5 STAN DRAPKIN. OCTOBER 2013. SECURITY DRIVEN .NET

      Add to Reading List

      Source URL: securitydriven.net

      Language: English - Date: 2015-04-04 22:36:18
      129Search algorithms / Cryptographic hash functions / Analysis of algorithms / Probabilistic complexity theory / Randomized algorithm / PP / Algorithm / Hash function / Universal hashing / Theoretical computer science / Applied mathematics / Computational complexity theory

      A Scalable and Nearly Uniform Generator of SAT Witnesses? Supratik Chakraborty1 , Kuldeep S. Meel2 , and Moshe Y. Vardi2 1 2

      Add to Reading List

      Source URL: www.cs.rice.edu

      Language: English - Date: 2013-07-17 18:10:56
      130Hashing / MD5 / HMAC / SHA-2 / Collision attack / SHA-1 / Hash function / Crypt / Merkle–Damgård construction / Error detection and correction / Cryptographic hash functions / Cryptography

      EECS 388 Intro to Computer Security September 5, 2014 Project 1: Attacking Cryptographic Hashes

      Add to Reading List

      Source URL: www.eecs.umich.edu

      Language: English - Date: 2014-12-24 15:06:41
      UPDATE