Hash functions

Results: 1148



#Item
151

BRICS Basic Research in Computer Science BRICS RSR. Pagh: Hash and Displace: Efficient Evaluation of Minimal Perfect Hash Functions Hash and Displace:

Add to Reading List

Source URL: www.brics.dk

Language: English - Date: 1999-06-28 06:51:39
    152

    On collisions of hash functions Turbo SHA-2

    Add to Reading List

    Source URL: cryptography.hyperlink.cz

    Language: English - Date: 2008-01-06 12:58:03
      153Computer programming / MD5 / SHA-1 / SHA-2 / MD4 / ALGOL 68 / Struct / Hash function / Whirlpool / Cryptographic hash functions / Cryptography / Computing

      Christian Grothoff COMP 3704 Computer Security Christian Grothoff

      Add to Reading List

      Source URL: grothoff.org

      Language: English - Date: 2011-06-21 07:45:47
      154Bitcoin / Peer-to-peer computing / Payment systems / Financial cryptography / Cryptographic hash functions / Cryptography / Software / Computing

      ISSCCIICT 2014, Limerick, June 26–27 Bitcoin Mining and its Energy Footprint Karl J. O’Dwyer† and David Malone∗ Hamilton Institute National University of Ireland Maynooth

      Add to Reading List

      Source URL: karlodwyer.github.io

      Language: English - Date: 2014-06-25 06:07:20
      155Search algorithms / Cryptographic hash functions / Analysis of algorithms / Probabilistic complexity theory / Randomized algorithm / PP / Algorithm / Hash function / Universal hashing / Theoretical computer science / Applied mathematics / Computational complexity theory

      A Scalable and Nearly Uniform Generator of SAT Witnesses? Supratik Chakraborty1 , Kuldeep S. Meel2 , and Moshe Y. Vardi2 1 2

      Add to Reading List

      Source URL: www.cs.rice.edu

      Language: English - Date: 2013-07-17 18:10:56
      156Cryptographic hash functions / The quick brown fox jumps over the lazy dog / Typography / Lazy Dog

      Microsoft Word - eiss_template_en.docx

      Add to Reading List

      Source URL: www.gakkai-web.net

      Language: English - Date: 2015-05-11 21:25:37
      157Cryptographic hash functions / Hashing / Advanced Encryption Standard / Cryptographic Module Validation Program / FIPS 140-2 / OpenSSL / Open Source Software Institute / SHA-2 / FIPS 140 / Cryptography / Cryptography standards / Cryptographic software

      OpenSSL FIPS Object Module VersionBy the Open Source Software Institute http://www.oss-institute.org/

      Add to Reading List

      Source URL: openssl.org

      Language: English - Date: 2007-12-13 15:11:03
      158Hashing / MD5 / HMAC / SHA-2 / Collision attack / SHA-1 / Hash function / Crypt / Merkle–Damgård construction / Error detection and correction / Cryptographic hash functions / Cryptography

      EECS 388 Intro to Computer Security September 5, 2014 Project 1: Attacking Cryptographic Hashes

      Add to Reading List

      Source URL: www.eecs.umich.edu

      Language: English - Date: 2014-12-24 15:06:41
      159NHS primary care trust / SHA-2 / SHA-1 / Department of Health / Office of Public Sector Information / Health / Medicine / Government / Cryptographic hash functions / National Health Service / NHS strategic health authority

      Integrated Services for People with Long-term Neurological Conditions: Evaluation of the Impact of the National Service Framework:  Appendices ProjectSylvia Bernard, Fiona Aspinal, Kate Gridley, Gillian Par

      Add to Reading List

      Source URL: www.york.ac.uk

      Language: English - Date: 2010-09-28 05:08:23
      160Information technology management / Cryptographic protocols / Cryptographic hash functions / EDIFACT / X.509 / Crypt / Public key certificate / SHA-2 / Checksum / Cryptography / Electronic commerce / Public-key cryptography

      SCTS-SC Appendix C Codelists Version

      Add to Reading List

      Source URL: www.tullverket.se

      Language: English - Date: 2013-06-12 06:23:19
      UPDATE