Hash functions

Results: 1148



#Item
191Computer hardware / Computer storage media / Computing / Hashing / Cryptography / Hash table / Hash function / SHA-2 / SHA-1 / Search algorithms / Cryptographic hash functions / Information science

doi:j.diin

Add to Reading List

Source URL: www.dfrws.org

Language: English - Date: 2015-03-03 22:33:04
192Search algorithms / Error detection and correction / Hash function / Information retrieval / Artificial intelligence / SHA-1 / Bloom filter / Sybil attack / Hashing / Cryptography / Cryptographic hash functions

582 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 29, NO. 3, MARCH 2011 P2DAP – Sybil Attacks Detection in Vehicular Ad Hoc Networks

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2012-03-12 23:31:44
193Mathematical analysis / Search algorithms / Hash function / Philippe Flajolet / Lagrange inversion theorem / Generating function / Stirling numbers and exponential generating functions / Mathematics / Combinatorics / Analytic combinatorics

From the Discrete to the Continuous, and Back... Philippe Flajolet INRIA, France

Add to Reading List

Source URL: algo.inria.fr

Language: English - Date: 2008-06-26 00:35:50
194SHA-2 / Collision attack / MD5 / Preimage attack / MD4 / Cryptanalysis / Collision / Hash function / Provably secure cryptographic hash function / Cryptographic hash functions / Cryptography / SHA-1

Improving Local Collisions: New Attacks on Reduced SHA-256? Florian Mendel, Tomislav Nad, Martin Schl¨affer IAIK, Graz University of Technology, Austria

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-20 04:23:58
195Cryptographic hash functions / Search algorithms / Computing / MD5 / Computer programming / Bloom filter / Hash function / Hash list / Hashing / Error detection and correction / Cryptography

Presenter Paper Structure

Add to Reading List

Source URL: www.dfrws.org

Language: English - Date: 2015-03-29 01:12:36
196Hashing / Message authentication codes / Search algorithms / Hash function / SHA-2 / Crypt / SHA-1 / Hash list / Hash tree / Cryptographic hash functions / Error detection and correction / Cryptography

Lecture 15: Hashing for Message Authentication Lecture Notes on “Computer and Network Security” by Avi Kak () April 30, 2015 3:29pm

Add to Reading List

Source URL: engineering.purdue.edu

Language: English - Date: 2015-04-30 15:30:26
197SHA-1 / Wang Xiaoyun / Serge Vaudenay / Collision resistance / Random oracle / Jean-Jacques Quisquater / Eurocrypt / Cryptography / Cryptographic hash functions / Hashing

CRYPTO 2005 Rump Session Program 19::35 20::21

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2005-08-16 15:12:59
198Hash function / Computing / Hashing / Information retrieval / Artificial intelligence / List / Hash list / ZPAQ / Hash table / Error detection and correction / Search algorithms / Cryptographic hash functions

Microsoft Word - How WCopyfind and Copyfind work.docx

Add to Reading List

Source URL: plagiarism.bloomfieldmedia.com

Language: English - Date: 2011-11-02 09:10:39
199SHA-1 / RIPEMD / Hash function / Crypt / Hash list / MD4 / MD5 / Cryptographic hash functions / Cryptography / SHA-2

Japan Cryptographic Module Validation Program(JCMVP) Specifications of Cryptographic Algorithm Implementation Testing — Hash Functions —

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-05-28 08:15:33
200Finitary relation / Artificial intelligence / Information science / Mathematics / Tabulation hashing / Search algorithms / Hash function / Hash table

The Pre-images of Bitwise AND Functions in Forensic Analysis Kyriacos E. Pavlou and Richard T. Snodgrass October 10, 2006

Add to Reading List

Source URL: timecenter.cs.aau.dk

Language: English - Date: 2011-09-02 07:26:42
UPDATE