SHA

Results: 7306



#Item
241

Sound Texture Classification Using Statistics from an Auditory Model Gabriele Carotti-Sha, Evan Penn, Daniel Villamizar Fall 2015 CS229 Machine Learning Class Project, Stanford University Motivation Sound textures may b

Add to Reading List

Source URL: cs229.stanford.edu

Language: English - Date: 2015-12-14 19:04:54
    242

    INDOCRYPT 09 – Tutorial – “The Design of Code-based Cryptosystems” 1 Code-based Cryptography – Selected publications [1] D. Augot, M. Finiasz, Ph. Gaborit, S. Manuel, and N. Sendrier. SHA-3

    Add to Reading List

    Source URL: indocrypt09.inria.fr

    Language: English - Date: 2009-12-18 10:58:59
      243

      SHA-3 proposal BLAKE∗ Jean-Philippe Aumasson† Luca Henzen‡ Willi Meier§

      Add to Reading List

      Source URL: 131002.net

      Language: English
        244

        Freestart collision for full SHA-1] Marc Stevens1 o , Pierre Karpman2,3,4 f , and Thomas Peyrin4 b 1 Centrum Wiskunde & Informatica, The Netherlands 2

        Add to Reading List

        Source URL: eprint.iacr.org

        Language: English - Date: 2016-02-22 06:11:55
          245

          Silicon Implementation of SHA-3 Finalists: BLAKE, Grøstl, JH, Keccak and Skein Xu Guo, Meeta Srivastav, Sinan Huang, Dinesh Ganta, Michael B. Henry, Leyla Nazhandali and Patrick Schaumont Center for Embedded Systems for

          Add to Reading List

          Source URL: www.ecrypt.eu.org

          Language: English - Date: 2011-05-19 03:02:40
            246

            Wave propagation software, computational science, and reproducible research Randall J. LeVeque ∗ Dedicated to Germund Dahlquist (1925–2005) and Joseph Oliger (1941–2005), two of the influential mentors who have sha

            Add to Reading List

            Source URL: faculty.washington.edu

            Language: English
              247

              Fair and Comprehensive Methodology for Comparing Hardware Performance of Fourteen Round Two SHA-3 Candidates using FPGAs? Kris Gaj, Ekawat Homsirikamol, and Marcin Rogawski ECE Department, George Mason University, Fairfa

              Add to Reading List

              Source URL: mason.gmu.edu

              Language: English - Date: 2010-06-26 16:07:12
                248

                Architecture-­‐level  Security  Issues     for  main  memory   Ali  Shafiee   Aganda   •  Replay-­‐A;ack  

                Add to Reading List

                Source URL: www.eng.utah.edu

                Language: English - Date: 2015-10-07 16:52:04
                  249Economy of Shanghai / Stock exchanges in China / Shanghai Stock Exchange / Hong Kong Stock Exchange / Shanghai-Hong Kong Stock Connect / SSE plc / Sino Land / Tsim Sha Tsui Properties Limited

                  14 MarchAdjustment for CES Shanghai-Hong Kong Stock Connect Index Series China Exchanges Services Company Limited and its index services agent, China Securities Index Company Limited, will make the following chang

                  Add to Reading List

                  Source URL: www.cesc.com

                  Language: English - Date: 2016-03-14 05:52:35
                  250Secure communication / Cryptographic hash functions / Cryptographic protocols / Transport Layer Security / Cryptography / Collision attack / Cipher suite / MD5 / OpenSSL / Challengeresponse authentication / Man-in-the-middle attack / SHA-2

                  Transcript Collision Attacks: Breaking Authentication in TLS, IKE, and SSH Karthikeyan Bhargavan Ga¨etan Leurent

                  Add to Reading List

                  Source URL: www.mitls.org

                  Language: English - Date: 2016-01-06 07:34:05
                  UPDATE