Cryptographic hash function

Results: 1121



#Item
151Stochastic Analysis of A Randomized Detection Algorithm for Pollution Attack in P2P Live Streaming Systems Yongkun Li John C.S. Lui The Chinese University of Hong Kong

Stochastic Analysis of A Randomized Detection Algorithm for Pollution Attack in P2P Live Streaming Systems Yongkun Li John C.S. Lui The Chinese University of Hong Kong

Add to Reading List

Source URL: www.cs.cuhk.hk

Language: English - Date: 2011-07-14 21:00:42
1521 SSL, TLS, and Cryptography We live in an increasingly connected world. During the last decade of the 20th century the Internet rose to popularity and forever changed how we live our lives. Today we rely on our phones a

1 SSL, TLS, and Cryptography We live in an increasingly connected world. During the last decade of the 20th century the Internet rose to popularity and forever changed how we live our lives. Today we rely on our phones a

Add to Reading List

Source URL: sslmate.com

Language: English - Date: 2015-06-06 19:18:36
153

PDF Document

Add to Reading List

Source URL: coralcdn.org

Language: English - Date: 2004-03-19 09:39:34
154i A random zoo: sloth, un∨corn, and trx Arjen K. Lenstra and Benjamin Wesolowski EPFL IC LACAL, Station 14, CH-1015 Lausanne, Switzerland  Abstract. Many applications require trustworthy generation of public random num

i A random zoo: sloth, un∨corn, and trx Arjen K. Lenstra and Benjamin Wesolowski EPFL IC LACAL, Station 14, CH-1015 Lausanne, Switzerland Abstract. Many applications require trustworthy generation of public random num

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-22 06:51:37
155An algorithm for MD5 single-block collision attack using high-performance computing cluster

An algorithm for MD5 single-block collision attack using high-performance computing cluster

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-11-07 01:57:01
156D RAGOON: An Information Accountability System for High-Performance Databases Kyriacos E. Pavlou 1 and Richard T. Snodgrass 2 Department of Computer Science, The University of Arizona P.O. Box, Tucson, AZ 85721–

D RAGOON: An Information Accountability System for High-Performance Databases Kyriacos E. Pavlou 1 and Richard T. Snodgrass 2 Department of Computer Science, The University of Arizona P.O. Box, Tucson, AZ 85721–

Add to Reading List

Source URL: www.cs.arizona.edu

Language: English - Date: 2012-03-18 19:10:26
157Forensic Analysis of Database Tampering Kyriacos Pavlou Richard T. Snodgrass  Department of Computer Science

Forensic Analysis of Database Tampering Kyriacos Pavlou Richard T. Snodgrass Department of Computer Science

Add to Reading List

Source URL: www.cs.arizona.edu

Language: English - Date: 2007-09-24 16:43:05
158Japan Cryptographic Module Validation Program(JCMVP)  Specifications of Cryptographic Algorithm Implementation Testing — Key Establishment Schemes —

Japan Cryptographic Module Validation Program(JCMVP) Specifications of Cryptographic Algorithm Implementation Testing — Key Establishment Schemes —

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-05-28 08:17:39
1591  Physical One-Way Functions by  Pappu Srinivasa Ravikanth

1 Physical One-Way Functions by Pappu Srinivasa Ravikanth

Add to Reading List

Source URL: www.cba.mit.edu

Language: English - Date: 2011-12-13 18:32:03
160Selective Jamming Attacks in Wireless Networks Alejandro Proa˜no Loukas Lazos  Dept. of Electrical and Computer Engineering

Selective Jamming Attacks in Wireless Networks Alejandro Proa˜no Loukas Lazos Dept. of Electrical and Computer Engineering

Add to Reading List

Source URL: www2.engr.arizona.edu

Language: English - Date: 2010-02-05 14:49:04