Hash functions

Results: 1148



#Item
141SimHash: Hash-based Similarity Detection Caitlin Sadowski University of California, Santa Cruz   Greg Levin

SimHash: Hash-based Similarity Detection Caitlin Sadowski University of California, Santa Cruz Greg Levin

Add to Reading List

Source URL: simhash.googlecode.com

Language: English - Date: 2007-12-13 05:28:46
142Winnowing: Local Algorithms for Document Fingerprinting Saul Schleimer Daniel S. Wilkerson  Alex Aiken

Winnowing: Local Algorithms for Document Fingerprinting Saul Schleimer Daniel S. Wilkerson Alex Aiken

Add to Reading List

Source URL: dsw.users.sonic.net

Language: English - Date: 2015-06-08 15:50:28
143Appears in Proceedings of the 23rd IEEE International Conference on Distributed Computing Systems (ICDCS ’03).  The Hash History Approach for Reconciling Mutual Inconsistency Brent ByungHoon Kang, Robert Wilensky and J

Appears in Proceedings of the 23rd IEEE International Conference on Distributed Computing Systems (ICDCS ’03). The Hash History Approach for Reconciling Mutual Inconsistency Brent ByungHoon Kang, Robert Wilensky and J

Add to Reading List

Source URL: oceanstore.cs.berkeley.edu

Language: English - Date: 2003-03-13 15:50:35
144ISSCCIICT 2014, Limerick, June 26–27  Bitcoin Mining and its Energy Footprint Karl J. O’Dwyer† and David Malone∗ Hamilton Institute National University of Ireland Maynooth

ISSCCIICT 2014, Limerick, June 26–27 Bitcoin Mining and its Energy Footprint Karl J. O’Dwyer† and David Malone∗ Hamilton Institute National University of Ireland Maynooth

Add to Reading List

Source URL: karlodwyer.github.io

Language: English - Date: 2014-06-25 06:07:20
145Microsoft PowerPoint - preneel_enisa08v4.ppt

Microsoft PowerPoint - preneel_enisa08v4.ppt

Add to Reading List

Source URL: www.nis-summer-school.eu

Language: English - Date: 2008-10-20 04:40:05
146BRICS  Basic Research in Computer Science BRICS RSPagh & Rodler: Lossy Dictionaries  Lossy Dictionaries

BRICS Basic Research in Computer Science BRICS RSPagh & Rodler: Lossy Dictionaries Lossy Dictionaries

Add to Reading List

Source URL: www.brics.dk

Language: English - Date: 2001-09-06 08:24:05
147Universal One-Way Hash Functions via Inaccessible Entropy Iftach Haitner1 , Thomas Holenstein2 , Omer Reingold3, , Salil Vadhan4, , and Hoeteck Wee5, 1

Universal One-Way Hash Functions via Inaccessible Entropy Iftach Haitner1 , Thomas Holenstein2 , Omer Reingold3, , Salil Vadhan4, , and Hoeteck Wee5, 1

Add to Reading List

Source URL: www.cs.tau.ac.il

- Date: 2013-06-11 04:13:06
    148BRICS  Basic Research in Computer Science BRICS RSR. Pagh: Dispersing Hash Functions  Dispersing Hash Functions

    BRICS Basic Research in Computer Science BRICS RSR. Pagh: Dispersing Hash Functions Dispersing Hash Functions

    Add to Reading List

    Source URL: www.brics.dk

    Language: English - Date: 2001-02-19 04:19:01
      149On collisions of hash functions Turbo SHA-2

      On collisions of hash functions Turbo SHA-2

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2008-01-01 15:20:21
        150non-trivial black-box combiners for collision-resistant hash-functions don’t exist Krzysztof Pietrzak (CWI Amsterdam)  Eurocrypt May

        non-trivial black-box combiners for collision-resistant hash-functions don’t exist Krzysztof Pietrzak (CWI Amsterdam) Eurocrypt May

        Add to Reading List

        Source URL: www.iacr.org

        Language: English - Date: 2007-06-12 08:51:13