Hash functions

Results: 1148



#Item
201MOUNT VERNON HASH HOUSE HARRIERS 2015 ANNUAL GENERAL MEETING (AGM) When: Friday 17 April 2015 to Sunday 19 Aprilnights) Where: Dewey Beach, DE Hash hotel: Atlantic Oceanside Motel, 1700 Coastal Hwy, Dewey Beach,

MOUNT VERNON HASH HOUSE HARRIERS 2015 ANNUAL GENERAL MEETING (AGM) When: Friday 17 April 2015 to Sunday 19 Aprilnights) Where: Dewey Beach, DE Hash hotel: Atlantic Oceanside Motel, 1700 Coastal Hwy, Dewey Beach,

Add to Reading List

Source URL: www.dchashing.org

Language: English - Date: 2014-12-26 18:09:44
202Tightly-Secure Signatures from Chameleon Hash Functions NIST, Maryland, PKC 2015 Olivier Blazy1 , Saqib A. Kakvi2 , Eike Kiltz2 , Jiaxin Pan2 1 University of Limoges, France

Tightly-Secure Signatures from Chameleon Hash Functions NIST, Maryland, PKC 2015 Olivier Blazy1 , Saqib A. Kakvi2 , Eike Kiltz2 , Jiaxin Pan2 1 University of Limoges, France

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2015-03-30 09:20:20
203Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate Marc Stevens1 , Alexander Sotirov2 , Jacob Appelbaum3 , Arjen Lenstra4,5 , David Molnar6 , Dag Arne Osvik4 , and Benne de Weger7 1

Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate Marc Stevens1 , Alexander Sotirov2 , Jacob Appelbaum3 , Arjen Lenstra4,5 , David Molnar6 , Dag Arne Osvik4 , and Benne de Weger7 1

Add to Reading List

Source URL: deweger.xs4all.nl

Language: English
204

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-09 11:38:04
205May 2013 MADALGO seminar by Mikkel Thorup, University of Copenhagen The Power of Tabulation Hashing Abstract: Abstract Randomized algorithms are often enjoyed for their simplicity, but the hash functions used to yield

May 2013 MADALGO seminar by Mikkel Thorup, University of Copenhagen The Power of Tabulation Hashing Abstract: Abstract Randomized algorithms are often enjoyed for their simplicity, but the hash functions used to yield

Add to Reading List

Source URL: old-madalgo.au.dk

Language: English - Date: 2013-05-10 08:51:10
206Microsoft Word - AAI Letter to Sens Carper and Coburn.government spending on conferences

Microsoft Word - AAI Letter to Sens Carper and Coburn.government spending on conferences

Add to Reading List

Source URL: aai.org

Language: English - Date: 2014-08-04 12:04:02
207Advancements in TMTOs Steve Thomas “Sc00bz” Passwords^12 TobTu.com/passwords12 1

Advancements in TMTOs Steve Thomas “Sc00bz” Passwords^12 TobTu.com/passwords12 1

Add to Reading List

Source URL: passwords12.at.ifi.uio.no

Language: English - Date: 2012-12-06 12:19:04
208Secure Names for Bit-Strings Stuart Haber*  W. Scott Stornetta*

Secure Names for Bit-Strings Stuart Haber* W. Scott Stornetta*

Add to Reading List

Source URL: nakamotoinstitute.org

Language: English - Date: 2014-03-23 11:44:47
209Non Observability in the Random Oracle Model Prabhanjan Ananth and Raghav Bhaskar Microsoft Research India BangaloreAbstract

Non Observability in the Random Oracle Model Prabhanjan Ananth and Raghav Bhaskar Microsoft Research India BangaloreAbstract

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-18 23:51:34
210MYK-85 Key Management Unit A complete, 32-bit RISC-based cryptographic processor with Baton, DES, and Triple DES in

MYK-85 Key Management Unit A complete, 32-bit RISC-based cryptographic processor with Baton, DES, and Triple DES in

Add to Reading List

Source URL: www.raytheoncyber.com

Language: English - Date: 2015-04-19 23:42:38