Hash functions

Results: 1148



#Item
331Law / The quick brown fox jumps over the lazy dog / Typography / Fingerprint / Expert witness / Forensic science / Evidence / MD5 / SHA-1 / Cryptographic hash functions / Evidence law / Cryptography

Lessons from prosecutions of Child Pornography and other “prohibited” material Ajoy Ghosh, Security Executive © Logica 2008.

Add to Reading List

Source URL: www.cyberlawcentre.org

Language: English - Date: 2009-03-31 21:25:01
332Hashing / HMAC / SHA-1 / Advanced Encryption Standard / SHA-2 / Cryptographic protocols / Error detection and correction / Cryptography / Cryptographic hash functions

Microsoft Word - CTP RevisionregardingStep 4.doc

Add to Reading List

Source URL: dcimovies.com

Language: English - Date: 2014-04-30 01:19:05
333Computing / Hashing / Mathematics / Applied mathematics / Hash table / Hash function / Parallel computing / Algorithm / Collision / Cryptographic hash functions / Search algorithms / Cryptography

MOMENTUM - A MEMORY-HARD PROOF-OF-WORK VIA FINDING BIRTHDAY COLLISIONS DANIEL LARIMER Invictus Innovations, Inc ABSTRACT. We introduce the concept of memory-hard proof-of-work

Add to Reading List

Source URL: hashcash.org

Language: English - Date: 2014-01-13 13:07:17
334Error detection and correction / Search algorithms / Proof-of-work system / Lamport signature / Hash function / Hash tree / SHA-1 / Hash list / Trie / Cryptography / Cryptographic hash functions / Hashing

An (Almost) Constant-Effort Solution-Verification Proof-of-Work Protocol based on Merkle Trees (extended and colored version of [7]) Fabien Coelho ´ CRI, Ecole des mines de Paris,

Add to Reading List

Source URL: hashcash.org

Language: English - Date: 2008-06-22 07:14:34
335RC6 / Advanced Encryption Standard / Q / Blowfish / VEST / SHA-1 / Data Encryption Standard / Cryptography / Cryptographic hash functions / Block ciphers

Automatic Formal Verification of Block Cipher Implementations

Add to Reading List

Source URL: verify.stanford.edu

Language: English - Date: 2010-02-18 01:25:10
336Hashing / MD5 / HMAC / SHA-2 / Collision attack / SHA-1 / Crypt / Merkle–Damgård construction / Hash function / Error detection and correction / Cryptographic hash functions / Cryptography

CIS 331 Introduction to Networks & Security January 23, 2014 Project 1: Attacking Cryptographic Hashes

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2014-11-18 15:19:13
337Distributed revision control systems / Version control / Git / Cryptographic hash functions / Hashing / Repo / Linux kernel / Distributed revision control / Apache Subversion / Software / Computer programming / Computing

Git Community Book The open Git resource pulled together by the whole community AUTHORS Thank these guys:

Add to Reading List

Source URL: github.s3.amazonaws.com

Language: English - Date: 2011-09-21 18:46:41
338Computing / Hashing / Mathematics / Applied mathematics / Hash table / Hash function / Parallel computing / Algorithm / Collision / Cryptographic hash functions / Search algorithms / Cryptography

MOMENTUM - A MEMORY-HARD PROOF-OF-WORK VIA FINDING BIRTHDAY COLLISIONS DANIEL LARIMER Invictus Innovations, Inc ABSTRACT. We introduce the concept of memory-hard proof-of-work

Add to Reading List

Source URL: www.hashcash.org

Language: English - Date: 2014-01-13 13:07:17
339Hashing / Computing / Software / Bitcoin / Peer-to-peer computing / Hash tree / Hash list / Hash function / Cryptographic nonce / Cryptography / Error detection and correction / Cryptographic hash functions

Bitcoin: A Peer-to-Peer Electronic Cash System Satoshi Nakamoto www.bitcoin.org Abstract. A purely peer-to-peer version of electronic cash would allow online

Add to Reading List

Source URL: www.weusecoins.com

Language: English - Date: 2015-04-20 01:14:27
340Hash list / LOCKSS / Transmission Control Protocol / Localhost / Hash function / Computing / Network architecture / Information science / Error detection and correction / Cryptographic hash functions / Hashing

file:///tmp/voter-good.txt # Receive Poll message, create V3Voter to handle it 16:09:59.842: Debug: 3-V3Voter: ThreadId 3 is SCommRcv: TCP:[]::09:59.842: Debug3: 3-V3Voter: Creating V3 Voter for poll: H

Add to Reading List

Source URL: documents.clockss.org

Language: English - Date: 2014-07-21 13:42:30
UPDATE