<--- Back to Details
First PageDocument Content
Hash function / Cryptographic hash functions / Information retrieval / Artificial intelligence / Cyberwarfare / Cryptography / Hashing / Error detection and correction
Date: 2014-06-09 10:18:42
Hash function
Cryptographic hash functions
Information retrieval
Artificial intelligence
Cyberwarfare
Cryptography
Hashing
Error detection and correction

COMPUTER SCIENCE TRIPOS Part IB – 2012 – Paper 4 9 Security I (MGK) (a) Name and briefly explain three increasingly demanding security properties expected from a secure hash function h.

Add to Reading List

Source URL: www.cl.cam.ac.uk

Download Document from Source Website

File Size: 82,13 KB

Share Document on Facebook

Similar Documents

How to Calculate P(O) Calculating P(O) Forward Algorithm Backward Algorithm

How to Calculate P(O) Calculating P(O) Forward Algorithm Backward Algorithm

DocID: 1rsaS - View Document

Daniels_meeting_cover.eps

Daniels_meeting_cover.eps

DocID: 1rphC - View Document

1  Underdesigned and Opportunistic Computing in Presence of Hardware Variability Puneet Gupta1 , Member, IEEE, Yuvraj Agarwal2 , Member, IEEE, Lara Dolecek1 , Member, IEEE, Nikil Dutt6 , Fellow, IEEE, Rajesh K. Gupta2 ,

1 Underdesigned and Opportunistic Computing in Presence of Hardware Variability Puneet Gupta1 , Member, IEEE, Yuvraj Agarwal2 , Member, IEEE, Lara Dolecek1 , Member, IEEE, Nikil Dutt6 , Fellow, IEEE, Rajesh K. Gupta2 ,

DocID: 1roDZ - View Document

PROBABILISTIC ALGORITHM FOR LIST VITERBI DECODING by Janani Kalyanam

PROBABILISTIC ALGORITHM FOR LIST VITERBI DECODING by Janani Kalyanam

DocID: 1rlYO - View Document