Error function

Results: 718



#Item
61Cryptography / Message authentication codes / Pseudorandom function family / Pseudorandomness / Error detection and correction / Hash-based message authentication code / Advantage / Randomness extractor

The Exact PRF-Security of NMAC and HMAC? Peter Gaˇzi, Krzysztof Pietrzak, and Michal Ryb´ar IST Austria JulyAbstract. NMAC is a mode of operation which turns a fixed input-length keyed hash function f into a

Add to Reading List

Source URL: pub.ist.ac.at

Language: English - Date: 2014-07-24 05:23:52
62Information retrieval / Hashing / Information science / Search algorithms / Error detection and correction / Cryptography / Cryptographic hash functions / Arrays / Hash table / Hash function / Hash list / Hash

Efficient Testing Operations on Dynamic Graph Structures using Strong Hash Functions Hoyt Koepke∗ Elizabeth Thompson∗

Add to Reading List

Source URL: www.stat.washington.edu

Language: English - Date: 2010-03-17 13:23:00
63Cryptography / Cryptographic hash functions / Hashing / Error detection and correction / NIST hash function competition / SHA-3 / Secure Hash Algorithm / SHA-2 / SHA-1 / Secure Hash Standard / Crypt / Hash function

Additional Secure hash Algorithm Standards Offer New Opportunities for Data Protection

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-09-24 10:22:35
64Cryptography / Cryptographic hash functions / Hashing / Error detection and correction / Universal one-way hash function / Preimage attack / Collision resistance / Hash function / Hash list / SHA-3 / One-way compression function

Introduction MD New Results I

Add to Reading List

Source URL: www.hyperelliptic.org

Language: English - Date: 2008-09-27 14:59:29
65Probability distributions / Binomial distribution / Normal distribution / Generalization error / Uniform distribution / Limit of a function / KullbackLeibler divergence

Tutorial on Pra ti al Predi tion Theory for Classi ation John Langford jlhun h.net Toyota Te hnologi al Institute at Chi ago

Add to Reading List

Source URL: hunch.net

Language: English - Date: 2006-12-03 12:48:21
66Cryptography / Cryptographic hash functions / Search algorithms / Hashing / Revenue stamps / Error detection and correction / Hash function / Digital signature / Universal one-way hash function / Claw-free permutation / E-stamping

How to Time-Stamp a Digital Document Stuart Haber W. Scott Stornetta

Add to Reading List

Source URL: www.anf.es

Language: English - Date: 2014-05-12 07:16:17
67Cryptography / Information retrieval / Search algorithms / Information science / Cryptographic hash functions / Hashing / Error detection and correction / Hash table / SHA-1 / Version vector / Hash function / Euclidean vector

Appears in Proceedings of the 23rd IEEE International Conference on Distributed Computing Systems (ICDCS ’03). The Hash History Approach for Reconciling Mutual Inconsistency Brent ByungHoon Kang, Robert Wilensky and J

Add to Reading List

Source URL: www.oceanstore.org

Language: English - Date: 2003-03-13 15:50:35
68Search algorithms / Hashing / Dimension reduction / Locality-sensitive hashing / Error detection and correction / Hash function / Relevance / Recommender system / K-nearest neighbors algorithm

Real-Time Recommendation of Diverse Related Articles Sofiane Abbar Sihem Amer-Yahia Piotr Indyk

Add to Reading List

Source URL: www2013.wwwconference.org

Language: English - Date: 2014-07-21 08:47:06
69Cryptography / Hashing / Error detection and correction / Public-key cryptography / Search algorithms / Digital signature / Cryptographic hash function / Post-quantum cryptography / RSA / Hash function / Merkle tree / MD5

SPHINCS: practical stateless hash-based signatures 1,3 , Daira Hopwood2 , Andreas Hülsing3 , Tanja Lange3 , 3 4 4 Ruben Niederhagen , Louiza Papachristodoulou , Peter Schwabe , and

Add to Reading List

Source URL: cryptojedi.org

Language: English - Date: 2014-10-04 10:08:48
70Operator theory / Hilbert space / Statistical classification / Linear algebra / Support vector machine / Reproducing kernel Hilbert space / Function / Convex function / Positive-definite kernel / Mathematics / Mathematical analysis / Statistics

Radius-Margin Bound on the Leave-One-Out Error of the LLW-M-SVM Yann Guermeur LORIA-CNRS Campus Scientifique, BPVandœuvre-l`es-Nancy cedex, France

Add to Reading List

Source URL: www.loria.fr

Language: English - Date: 2009-02-12 12:18:50
UPDATE