Hash functions

Results: 1148



#Item
351Error detection and correction / Hash function / Transmission Control Protocol / One-way compression function / CBC-MAC / Cryptography / Hashing / Cryptographic hash functions

CS255: Cryptography and Computer Security Winter 2005 Assignment #2 Due: Wednesday, February 16th, 2005.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2005-02-08 17:18:01
352Error detection and correction / Public-key cryptography / Hash function / Digital signature / RSA / Hash tree / Collision resistance / One-way compression function / UMAC / Cryptography / Cryptographic hash functions / Hashing

CS255: Cryptography and Computer Security Winter 2000 Assignment #3

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2001-02-28 17:43:23
353The quick brown fox jumps over the lazy dog / Font family / Visual arts / Typeface / Typesetting / Cryptographic hash functions / Typography

Alias type library Union typeface Union Family ——————––

Add to Reading List

Source URL: www.t26.com

Language: English
354Error detection and correction / Search algorithms / Hash tree / Hash list / Hash function / SHA-1 / Hash table / Lamport signature / Cryptographic hash functions / Hashing / Cryptography

Optimal Parameter Selection for Efficient Memory Integrity Verification Using Merkle Hash Trees Dan Williams and Emin G¨un Sirer {djwill, egs}@cs.cornell.edu Department of Computer Science Cornell University

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2005-03-20 00:13:33
355Error detection and correction / MD5 / Hash function / SHA-1 / Collision resistance / Collision / One-way compression function / Cryptographic hash functions / Cryptography / Hashing

CS255: Cryptography and Computer Security Winter 2009 Assignment #2 Due: Wednesday, Feb. 18, 2009.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2009-02-10 00:34:43
356Key management / Crypt / Hashing / Bcrypt / Salt / Password / Hash function / Key derivation function / MD5 / Cryptography / Search algorithms / Cryptographic software

CRYPT(3) Library functions CRYPT(3)

Add to Reading List

Source URL: download.openwall.net

Language: English - Date: 2009-09-07 19:42:15
357Hash function / Artificial intelligence / Information retrieval / Information science / Cryptographic hash functions / Regression analysis / Search algorithms / Hashing / Error detection and correction

Case Study 1: Estimating Click Probabilities Tackling  an  Unknown  Number  of   Features  with  Sketching     Machine  Learning  for  Big  Data       CSE547/STAT548,  

Add to Reading List

Source URL: courses.cs.washington.edu

Language: English - Date: 2015-04-06 19:08:06
358Hash function / Artificial intelligence / Information retrieval / Information science / Cryptographic hash functions / Regression analysis / Search algorithms / Hashing / Error detection and correction

Case Study 1: Estimating Click Probabilities Tackling  an  Unknown  Number  of   Features  with  Sketching     Machine  Learning  for  Big  Data       CSE547/STAT548,  

Add to Reading List

Source URL: courses.cs.washington.edu

Language: English - Date: 2015-04-07 15:32:58
359Computing / SHA-2 / London / W postcode area / Bitcoin / Cryptographic nonce / Crypt / Hash function / Cryptography / Cryptographic hash functions / Software

GOLDSTRIKETM 1: COINTERRA’S FIRST GENERATION CRYPTO-CURRENCY PROCESSOR FOR BITCOIN MINING MACHINES Javed Barkatullah, Ph.D., MBA Timo Hanke, Ph.D.

Add to Reading List

Source URL: www.hotchips.org

Language: English - Date: 2014-08-12 14:05:46
360Cryptographic hash functions / Mathematics / Information retrieval / Error detection and correction / Hash function / Hash table / Key derivation function / Tabulation hashing / Rainbow table / Search algorithms / Cryptography / Hashing

STRONGER KEY DERIVATION VIA SEQUENTIAL MEMORY-HARD FUNCTIONS COLIN PERCIVAL Abstract. We introduce the concepts of memory-hard algorithms and sequential memory-hard functions, and argue that in order for key derivation f

Add to Reading List

Source URL: www.tarsnap.com

Language: English - Date: 2013-12-11 18:35:17
UPDATE