Cryptographic hash function

Results: 1121



#Item
31Information retrieval / Information science / Hashing / Search algorithms / Universal hashing / Hash table / Linear probing / Hash function / Leftover hash lemma / Bloom filter / Cryptographic hash function / Probability distribution

CS369N: Beyond Worst-Case Analysis Lecture #6: Pseudorandom Data and Universal Hashing∗ Tim Roughgarden† April 14,

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2014-11-14 21:12:34
32Computing / Software / Cryptographic hash functions / Error detection and correction / Hashing / Checksum / SHA-1 / Sha1sum / Hash list / OneDrive / Hash function / Zip

CE318/CE818: High-level Games Development Assignment Submission Procedure Due to the latest problems with the file capacity in Faser, we are going to establish the following procedure to upload your games so we can downl

Add to Reading List

Source URL: orb.essex.ac.uk

Language: English - Date: 2015-12-05 03:37:29
33Search algorithms / Hashing / Cryptographic hash functions / Computational complexity theory / Error detection and correction / Universal hashing / Hash function / UMAC / Hash table / Locality-sensitive hashing / Randomness extractor

Variationally Universal Hashing Ted Krovetz a and Phillip Rogaway b,c a Department of Computer Science, California State University Sacramento CAUSA

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2008-07-02 16:14:32
34Internet Standards / Internet protocols / Cryptographic protocols / Character encoding / Public key infrastructure / String / Lightweight Directory Access Protocol / Null / Online Certificate Status Protocol / Data type / Hash function / Value

KEK GRID CA Certificate and CRL Profile VerMay 30, 2016

Add to Reading List

Source URL: gridca.kek.jp

Language: English - Date: 2016-05-25 03:17:59
35Search algorithms / Hashing / Selection algorithm / Hash function / Randomized algorithm / A* search algorithm / Cryptographic hash function

Distributed Computation of the Mode Fabian Kuhn Institute of Theoretical Computer Science ETH Zurich

Add to Reading List

Source URL: disco.ethz.ch

Language: English - Date: 2014-09-26 08:36:27
36Cryptography / Schnorr signature / Random oracle / Optimal asymmetric encryption padding / Cryptographic hash function / Digital signature / Oracle machine / Hash function / Oracle Database / Padding

Microsoft PowerPoint - NPROM-zhang.pptx

Add to Reading List

Source URL: security-lab.jaist.ac.jp

Language: English - Date: 2015-11-22 02:25:26
37Error detection and correction / Hashing / Cryptographic hash functions / Search algorithms / Malware / Malware analysis / Computer virus / Antivirus software / Hash function / MD5 / Hash list / Crypt

Proceedings Template - WORD

Add to Reading List

Source URL: womencourage.acm.org

Language: English - Date: 2016-08-09 09:13:52
38NIST hash function competition / Cryptographic hash functions / SHA-3 / Hashing / Cryptography / Application-specific integrated circuit / Institute for Applied Information Processing and Communications / Crypt / Zorro

Side-Channel Analysis of the Zorro ASIC Advisor(s): Thomas Korak Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-09-08 06:00:03
39Distributed data storage / Email / Internet privacy / Public key infrastructure / Pastry / Simple Mail Transfer Protocol / Distributed hash table / Secure messaging / Short Message Service / Public-key cryptography / Cryptographic hash function

POST: A Secure, Resilient, Cooperative Messaging System Alan Mislove1 Ansley Post1 Dan S. Wallach1

Add to Reading List

Source URL: www.cs.rice.edu

Language: English - Date: 2003-04-12 02:53:53
40Cryptographic hash functions / Cryptography / NIST hash function competition / Stream ciphers / SHA-3 / Hashing / Sponge function / RadioGatn / Gilles Van Assche / Joan Daemen / Hash function / Random oracle

Keccak Guido Bertoni1 Joan Daemen1 Michaël Peeters2 Gilles Van Assche1 1 STMicroelectronics 2 NXP

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English - Date: 2013-09-19 10:37:36
UPDATE