Cryptographic hash function

Results: 1121



#Item
181Hash function / Cyberwarfare / Quantum superposition / Security / Applied mathematics / Cryptography / Commitment scheme / Cryptographic hash function

Computationally binding quantum commitments Dominique Unruh University of Tartu April 21, 2015

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-21 10:58:50
182SHA-2 / Collision attack / MD5 / Preimage attack / MD4 / Cryptanalysis / Collision / Hash function / Provably secure cryptographic hash function / Cryptographic hash functions / Cryptography / SHA-1

Improving Local Collisions: New Attacks on Reduced SHA-256? Florian Mendel, Tomislav Nad, Martin Schl¨affer IAIK, Graz University of Technology, Austria

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-20 04:23:58
183Hashing / Data / Mathematics / Database theory / Hash table / Hash function / Extensible Storage Engine / Database / Cryptographic hash function / Database management systems / Search algorithms / Data management

Tamper Detection in Audit Logs

Add to Reading List

Source URL: www.cs.arizona.edu

Language: English - Date: 2007-09-27 12:48:13
184Cryptographic hash functions / Search algorithms / Computing / MD5 / Computer programming / Bloom filter / Hash function / Hash list / Hashing / Error detection and correction / Cryptography

Presenter Paper Structure

Add to Reading List

Source URL: www.dfrws.org

Language: English - Date: 2015-03-29 01:12:36
185Hashing / Message authentication codes / Search algorithms / Hash function / SHA-2 / Crypt / SHA-1 / Hash list / Hash tree / Cryptographic hash functions / Error detection and correction / Cryptography

Lecture 15: Hashing for Message Authentication Lecture Notes on “Computer and Network Security” by Avi Kak () April 30, 2015 3:29pm

Add to Reading List

Source URL: engineering.purdue.edu

Language: English - Date: 2015-04-30 15:30:26
186Hash function / Computing / Hashing / Information retrieval / Artificial intelligence / List / Hash list / ZPAQ / Hash table / Error detection and correction / Search algorithms / Cryptographic hash functions

Microsoft Word - How WCopyfind and Copyfind work.docx

Add to Reading List

Source URL: plagiarism.bloomfieldmedia.com

Language: English - Date: 2011-11-02 09:10:39
187Hashing / Computer programming / Distributed computing architecture / MapReduce / Parallel computing / Hash function / Hash table / Cryptographic hash function / Associative array / Computing / Concurrent computing / Search algorithms

Optimizing MapReduce for Multicore Architectures Yandong Mao Robert Morris M. Frans Kaashoek Massachusetts Institute of Technology, Cambridge, MA Abstract Map 0

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2015-04-29 10:31:16
188Distributed data storage / Cryptographic hash function / Wireless sensor network / Denial-of-service attack / Man-in-the-middle attack / Onion routing / Cryptography / Public-key cryptography / Message authentication code

Pre-Authentication Filters: Providing DoS Resistance for Signature-Based Broadcast Authentication in Sensor Networks Qi Dong Donggang Liu∗ Peng Ning†

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:21
189SHA-1 / RIPEMD / Hash function / Crypt / Hash list / MD4 / MD5 / Cryptographic hash functions / Cryptography / SHA-2

Japan Cryptographic Module Validation Program(JCMVP) Specifications of Cryptographic Algorithm Implementation Testing — Hash Functions —

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-05-28 08:15:33
190Search algorithms / Hash House Harriers / Hash function / Hash list / Hash / Human behavior / Information retrieval / Artificial intelligence / Error detection and correction / Cryptographic hash functions / Hashing

MOUNT VERNON HASH HOUSE HARRIERS 2015 ANNUAL GENERAL MEETING (AGM) When: Friday 17 April 2015 to Sunday 19 Aprilnights) Where: Dewey Beach, DE Hash hotel: Atlantic Oceanside Motel, 1700 Coastal Hwy, Dewey Beach,

Add to Reading List

Source URL: www.dchashing.org

Language: English - Date: 2014-12-26 18:09:44
UPDATE