Hash function

Results: 1800



#Item
961Hashing / Search algorithms / Keccak / SHA-2 / Hash function / SHA-1 / Password / Salt / NIST hash function competition / Cryptography / Cryptographic hash functions / Error detection and correction

Pleco and Plectron – Two Provably Secure Password Hashing Algorithms Bo Zhu, Xinxin Fan, and Guang Gong Department of Electrical and Computer Engineering, University of Waterloo, Canada {bo.zhu,x5fan,ggong}@uwaterloo.

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-09-12 12:07:46
962Frame rate / Locality-sensitive hashing / Reference frame / Moving frame / Query / Information science / Mathematics / Search algorithms / Artificial intelligence / Hash function

THU-IMG at TRECVID 2010 Chen Sun, Jianmin Li, Bo Zhang, Qingtian Zhang Intelligent Multimedia Group State Key Laboratory of Intelligent Technology and Systems Tsinghua National Laboratory for Information Science and Tech

Add to Reading List

Source URL: www-nlpir.nist.gov

Language: English - Date: 2011-03-04 14:18:51
963Preimage attack / NIST hash function competition / SHA-1 / Hash function / Crypt / SHA-2 / Collision attack / Cryptographic hash functions / Cryptography / Hashing

Cryptography Research and Evaluation Committees

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:58:12
964NIST hash function competition / Authenticated encryption / Symmetric-key algorithm / Crypt / Advanced Encryption Standard / Cryptography / Cryptographic hash functions / Keccak

Tutorial on Keccak and SHA-3 by Guido Bertoni Abstract: Keccak has been selected as SHA-3 in[removed]It is a very flexible algorithm allowing to perform all the primitives of symmetric key cryptography: stream cipher, hash

Add to Reading List

Source URL: www.chesworkshop.org

Language: English - Date: 2014-07-02 15:54:48
965Science / Acoustic fingerprinting / Digital rights management / Digital video fingerprinting / Video processing / Video copy detection / Hash function / Acoustic fingerprint / Fingerprint / Information science / Information / Multimedia

ITU MSPR TRECVID 2010 VIDEO COPY DETECTION SYSTEM Sezer Kutluk, Bilge Gunsel Multimedia Signal Processing and Pattern Recognition Group Department of Electronics and Communications Engineering Istanbul Technical Universi

Add to Reading List

Source URL: www-nlpir.nist.gov

Language: English - Date: 2011-03-04 14:18:42
966Random oracle / HMAC / Collision resistance / Optimal asymmetric encryption padding / Hash function / Preimage attack / Collision / Ciphertext indistinguishability / SWIFFT / Cryptography / Cryptographic hash functions / Hashing

X-Sieve: CMU Sieve 2.2 From: "Ron Steinfeld" To: Subject: Hash Algorithm Requirements and Evaluation Criteria Date: Fri, 27 Apr 2007 19:41:48 +1000 X-Mailer: Microsoft Outloo

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:02:04
967Error detection and correction / Search algorithms / Random oracle / Hash tree / Hash function / Hash chain / Oracle machine / Hash list / Provably secure cryptographic hash function / Cryptographic hash functions / Cryptography / Hashing

Security Proofs for the BLT Signature Scheme Ahto Buldas, Risto Laanoja, and Ahto Truu GuardTime AS, Tammsaare tee 60, 11316 Tallinn, Estonia. Abstract. We present security proofs for the BLT signature scheme in the mode

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-09-04 03:31:48
968Search algorithms / Indexing / Search engine indexing / Searching / Google / Latent semantic indexing / Hash table / PARC / Hash function / Information science / Science / Information retrieval

Microsoft Word - Craig Silverstein

Add to Reading List

Source URL: www.census.gov

Language: English - Date: 2012-11-26 15:02:20
969Computer programming / Record / Constant / Variable / Field / Hash function / Data file / Data types / Software engineering / Computing

Exercise 2: The QES-REC-CHK triplet At the end of this exercise you should be able to: a. Create and edit a questionnaire file (*.qes). b. Make a record file (*.rec). c. Make and edit a check file (*.chk).

Add to Reading List

Source URL: www.tbrieder.org

Language: English - Date: 2014-03-15 12:05:50
970Fingerprints / Science / Digital rights management / Digital video fingerprinting / Video processing / Acoustic fingerprint / Video copy detection / Hash function / Confidence interval / Statistics / Acoustic fingerprinting / Biometrics

TNO at TRECVID2008 Combining Audio and Video Fingerprinting for Robust Copy Detection Peter Jan Doets, Pieter Eendebak, Elena Ranguelova, Wessel Kraaij {Peter_Jan.Doets, Pieter.Eendebak, Wessel.Kraaij}@TNO.nl, E.Ranguelo

Add to Reading List

Source URL: www-nlpir.nist.gov

Language: English - Date: 2008-12-03 08:54:08
UPDATE