Hash function

Results: 1800



#Item
991Cryptographic hash functions / Probability theory / Optimal asymmetric encryption padding / Random oracle / Advantage / Random number generation / Random walk / Random sequence / Random function / Cryptography / Randomness / Stochastic processes

CSAR: A Practical and Provable Technique to Make Randomized Systems Accountable Michael Backes1,2 Peter Druschel2 1

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2009-10-16 16:58:36
992Data types / Markup languages / Literal / Primitive data type / YAML / String interning / Java / String / Hash function / Computing / Software engineering / Computer programming

Luatex 0.70 short reference 1 Getting started

Add to Reading List

Source URL: ftp.ctex.org

Language: English - Date: 2011-05-20 01:39:00
993Hashing / Crypt / Hash function / SHA-2 / Cryptographic hash functions / Cryptography / Search algorithms

X-Sieve: CMU Sieve 2.2 Date: Fri, 13 Apr 2007 15:43:28 +0300 From: Carmi Gressel Subject: Hash Algorithm Requirements and Evaluation Criteria To: william.burr@nist.gov, hash-function@nist.gov X-Mai

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:27:14
994Electronic commerce / Hashing / Computational complexity theory / Search algorithms / RSA / Cryptographic hash function / Communication complexity / Hash function / Homomorphic encryption / Cryptography / Theoretical computer science / Applied mathematics

On the Communication Complexity of Secure Function Evaluation with Long Output Pavel Hub´aˇcek∗ Daniel Wichs†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-26 12:48:08
995Computer-mediated communication / Cryptographic hash function / MD5 / LISTSERV / SHA-2 / Digital preservation / Checksum / Records management / H-Net / Computing / Email / Internet

H-Net Preservation Improvements

Add to Reading List

Source URL: www.h-net.org

Language: English - Date: 2008-08-18 14:18:35
996Information retrieval / Hash function / Hash table / Euclidean vector / Nearest neighbor search / Moving frame / Information science / Search algorithms / Mathematics

Osaka Prefecture University at TRECVID 2011 Tomohiro Sakata† Nobuaki Matozaki‡ Koichi Kise† Masakazu Iwamura† †Dept. of CSIS, Graduate School of Engineering ‡Dept. of CSIS, School of Engineering Osaka Prefect

Add to Reading List

Source URL: www-nlpir.nist.gov

Language: English - Date: 2012-01-10 13:32:28
997Error detection and correction / Data quality / Hash function / Digital continuity / Digital preservation / Crypt / Digital signature / Fingerprint / Hash list / Cryptography / Hashing / Cryptographic hash functions

Microsoft Word - DigitalContinuityHandout_NAGARA Judicial Records Forum

Add to Reading List

Source URL: nagara.org

Language: English - Date: 2014-06-06 16:31:44
998Error detection and correction / Search algorithms / Hash chain / Lamport signature / Hash function / Password / Hash tree / Hash / SHA-2 / Cryptography / Cryptographic hash functions / Hashing

Efficient Implementation of Keyless Signatures with Hash Sequence Authentication Ahto Buldas, Risto Laanoja, and Ahto Truu GuardTime AS, Tammsaare tee 60, 11316 Tallinn, Estonia. Abstract. We present new ideas for decre

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-09-03 05:03:49
999Computer programming / Computer performance / Arrays / Lookup table / Software optimization / Hash function / Hash table / Function / Search algorithms / Computing / Mathematics

Package ‘fastmatch’ July 2, 2014 Version 1.0-4 Title Fast match() function Author Simon Urbanek Maintainer Simon Urbanek

Add to Reading List

Source URL: cran.r-project.org

Language: English - Date: 2014-07-02 11:50:02
1000Computer file formats / Open formats / Markup languages / Technical communication / Email / XML / Hash function / Crypt / Computing / OSI protocols / Electronic documents

RTF Document

Add to Reading List

Source URL: www.epa.gov

Language: English - Date: 2013-07-31 10:37:07
UPDATE