Hash tree

Results: 206



#Item
181Public key certificate / Digital signature / Online Certificate Status Protocol / Revocation list / Group signature / Certificate authority / SAS / Hash tree / Public key infrastructure / Cryptography / Public-key cryptography / Key management

Equipping “Smart” Devices With Public Key Signatures Xuhua Ding [removed] Daniele Mazzocchi [removed]

Add to Reading List

Source URL: www.mysmu.edu

Language: English - Date: 2006-02-19 04:01:22
182Search algorithms / Computing / Information retrieval / Artificial intelligence / Cryptography / Hash function / Online codes / Hash list / Hash tree / Cryptographic hash functions / Error detection and correction / Hashing

On-the-Fly Verification of Rateless Erasure Codes for Efficient Content Distribution Maxwell N. Krohn Michael J. Freedman

Add to Reading List

Source URL: www.coralcdn.org

Language: English - Date: 2004-03-19 09:39:34
183Information science / Artificial intelligence / Linear hashing / Hash table / Hash function / Extendible hashing / B-tree / Cuckoo hashing / Coalesced hashing / Search algorithms / Hashing / Information retrieval

LINEAR HASHING : A NEWTOOL FOR FILE AND TABLE ADDRESSING. Witold

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2001-01-17 18:53:56
184Skip graph / Skip list / Distributed hash table / Chord / B+ tree / Tree / Trie / Koorde / Tango tree / Graph theory / Distributed data storage / B-tree

doi:[removed]j.comcom[removed]

Add to Reading List

Source URL: www0.cs.ucl.ac.uk

Language: English - Date: 2010-05-14 09:06:57
185Cryptography / NIST hash function competition / SHA-2 / Hash function / SHA-1 / MD5 / Hash tree / Keccak / HMAC / Error detection and correction / Cryptographic hash functions / Hashing

BLAKE2: simpler, smaller, fast as MD5 Jean-Philippe Aumasson1 , Samuel Neves2 , Zooko Wilcox-O’Hearn3 , and Christian Winnerlein4

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-05-26 14:43:26
186Error detection and correction / Preimage attack / Search algorithms / Hash function / Collision attack / Birthday attack / Hash tree / Padding / Merkle–Damgård construction / Cryptographic hash functions / Cryptography / Hashing

Herding, Second Preimage and Trojan Message Attacks Beyond Merkle-Damg˚ ard

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2010-02-02 00:00:00
187Cryptographic hash function / Hash tree / Digital signature / Collision resistance / Hash function / Lamport signature / One-way compression function / Cryptography / Preimage attack / Merkle signature scheme

Merkle Signature Schemes, Merkle Trees and Their Cryptanalysis Georg Becker

Add to Reading List

Source URL: www.emsec.rub.de

Language: English - Date: 2011-04-11 11:06:58
188Cryptographic hash functions / Microsoft App-V / Hash tree / Hash function / Computing / Computer memory / Information / Data / Error detection and correction / Cache / Hashing

Missive: Fast Appliance Launch From an Untrusted Buffer Cache Jon Howell, Jeremy Elson, Bryan Parno, John R. Douceur Microsoft Research, Redmond, WA

Add to Reading List

Source URL: 131.107.65.14

Language: English - Date: 2013-01-31 17:33:54
189Computer programming / Information retrieval / Trie / Radix tree / Hash function / Perfect hash function / Bit array / Cryptographic hash function / FO / Hashing / Search algorithms / Computing

Theory and Practise of Monotone Minimal Perfect Hashing Djamal Belazzougui∗

Add to Reading List

Source URL: www.siam.org

Language: English - Date: 2010-03-18 09:59:10
190Distributed data storage / Computing / Computer programming / Cryptography / Data / Hash tree / Hash list / Binary tree / Trie / Hashing / Cryptographic hash functions / Error detection and correction

SECTOR: Secure Tracking of Node Encounters in Multi-hop Wireless Networks 1

Add to Reading List

Source URL: www.syssec.ethz.ch

Language: English - Date: 2006-09-14 08:13:37
UPDATE