Cryptographic hash function

Results: 1121



#Item
171MD5 / Search algorithms / Collision attack / Hash function / Padding / SHA-1 / Merkle–Damgård construction / Cryptography / Cryptographic hash functions / Hashing

Single-block collision attack on MD5 Marc Stevens Cryptology Group, CWI P.O. Box 94079, NL-1090 GB Amsterdam, The Netherlands January 29, 2012

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-01-29 17:14:50
172Search algorithms / Data / Relational database management systems / Database theory / Database / Hash function / Hash table / SQL / Cryptographic hash function / Database management systems / Data management / Computing

Microsoft Word - Thesis.doc

Add to Reading List

Source URL: www.cs.arizona.edu

Language: English - Date: 2010-12-07 14:51:15
173Computing / Cryptographic hash function / Information / Hash tree / Transmission Control Protocol / Data / Hash function / IP traceback / Error detection and correction / Hashing / Cryptography

Seluge: Secure and DoS-Resistant Code Dissemination in Wireless Sensor Networks∗ Sangwon Hyun, Peng Ning, An Liu North Carolina State University Abstract

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:10
174Information science / Artificial intelligence / Hash function / Perfect hash function / Hash table / Cryptographic hash function / Trie / Universal hashing / Tabulation hashing / Search algorithms / Hashing / Information retrieval

COMPUTNVG PRACTICES Using only a few simple and commonplace instructions, this algorithm efficiently maps variable-length text strings on to small integers.

Add to Reading List

Source URL: epaperpress.com

Language: English - Date: 2011-12-28 10:41:56
175Internet protocols / Cryptographic protocols / Internet standards / Authenticator / Cryptographic hash function / Security token / Hash chain / Transport Layer Security / Cryptographic nonce / Computing / Cryptography / Internet

iHTTP: Efficient Authentication of Non-Confidential HTTP Traffic? Jason Gionta1 , Peng Ning1 , and Xiaolan Zhang2 1 2

Add to Reading List

Source URL: gionta.org

Language: English - Date: 2014-07-20 15:18:58
176Hashing / Message authentication codes / Search algorithms / Cryptographic hash function / Public-key cryptography / Random number generation / PUF / Hash function / One-way function / Cryptography / Randomness / Physical Unclonable Function

Controlled Physical Random Functions and Applications BLAISE GASSEND, MARTEN VAN DIJK, DWAINE CLARKE and EMINA TORLAK Massachusetts Institute of Technology PIM TUYLS Philips Research

Add to Reading List

Source URL: homes.cs.washington.edu

Language: English - Date: 2014-08-13 19:26:58
177Cube attack / Cipher / Public-key cryptography / Encryption / International Data Encryption Algorithm / Authenticated encryption / Cryptographic hash function / Cryptography / Homomorphic encryption / Cryptanalysis

PROGRAM EUROCRYPT 2015 MONDAY, April 27th 9:00 9:15 Welcome

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English - Date: 2015-04-16 13:21:14
178Information retrieval / Artificial intelligence / Hash table / Hash function / Garbage collection / Cryptographic hash function / Double hashing / Hash / Associative array / Hashing / Search algorithms / Information science

Generation-Friendly Eq Hash Tables Abdulaziz Ghuloum and R. Kent Dybvig Department of Computer Science, Indiana University, Bloomington, IN 47408 {aghuloum,dyb}@cs.indiana.edu Abstract

Add to Reading List

Source URL: repository.readscheme.org

Language: English - Date: 2012-08-10 19:21:06
179Computer hardware / Computer storage media / Computing / Hashing / Cryptography / Hash table / Hash function / SHA-2 / SHA-1 / Search algorithms / Cryptographic hash functions / Information science

doi:j.diin

Add to Reading List

Source URL: www.dfrws.org

Language: English - Date: 2015-03-03 22:33:04
180Search algorithms / Error detection and correction / Hash function / Information retrieval / Artificial intelligence / SHA-1 / Bloom filter / Sybil attack / Hashing / Cryptography / Cryptographic hash functions

582 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 29, NO. 3, MARCH 2011 P2DAP – Sybil Attacks Detection in Vehicular Ad Hoc Networks

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2012-03-12 23:31:44
UPDATE