Cryptographic hash function

Results: 1121



#Item
31CS369N: Beyond Worst-Case Analysis Lecture #6: Pseudorandom Data and Universal Hashing∗ Tim Roughgarden† April 14,

CS369N: Beyond Worst-Case Analysis Lecture #6: Pseudorandom Data and Universal Hashing∗ Tim Roughgarden† April 14,

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2014-11-14 21:12:34
32CE318/CE818: High-level Games Development Assignment Submission Procedure Due to the latest problems with the file capacity in Faser, we are going to establish the following procedure to upload your games so we can downl

CE318/CE818: High-level Games Development Assignment Submission Procedure Due to the latest problems with the file capacity in Faser, we are going to establish the following procedure to upload your games so we can downl

Add to Reading List

Source URL: orb.essex.ac.uk

Language: English - Date: 2015-12-05 03:37:29
33Variationally Universal Hashing Ted Krovetz a and Phillip Rogaway b,c a Department of Computer Science, California State University Sacramento CAUSA

Variationally Universal Hashing Ted Krovetz a and Phillip Rogaway b,c a Department of Computer Science, California State University Sacramento CAUSA

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2008-07-02 16:14:32
34KEK GRID CA  Certificate and CRL Profile VerMay 30, 2016

KEK GRID CA Certificate and CRL Profile VerMay 30, 2016

Add to Reading List

Source URL: gridca.kek.jp

Language: English - Date: 2016-05-25 03:17:59
35Distributed Computation of the Mode Fabian Kuhn Institute of Theoretical Computer Science ETH Zurich

Distributed Computation of the Mode Fabian Kuhn Institute of Theoretical Computer Science ETH Zurich

Add to Reading List

Source URL: disco.ethz.ch

Language: English - Date: 2014-09-26 08:36:27
36Microsoft PowerPoint - NPROM-zhang.pptx

Microsoft PowerPoint - NPROM-zhang.pptx

Add to Reading List

Source URL: security-lab.jaist.ac.jp

Language: English - Date: 2015-11-22 02:25:26
37Proceedings Template - WORD

Proceedings Template - WORD

Add to Reading List

Source URL: womencourage.acm.org

Language: English - Date: 2016-08-09 09:13:52
38Side-Channel Analysis of the Zorro ASIC Advisor(s): Thomas Korak Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria  Motivation

Side-Channel Analysis of the Zorro ASIC Advisor(s): Thomas Korak Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-09-08 06:00:03
39POST: A Secure, Resilient, Cooperative Messaging System Alan Mislove1 Ansley Post1  Dan S. Wallach1

POST: A Secure, Resilient, Cooperative Messaging System Alan Mislove1 Ansley Post1 Dan S. Wallach1

Add to Reading List

Source URL: www.cs.rice.edu

Language: English - Date: 2003-04-12 02:53:53
40Keccak Guido Bertoni1 Joan Daemen1 Michaël Peeters2 Gilles Van Assche1 1 STMicroelectronics 2 NXP

Keccak Guido Bertoni1 Joan Daemen1 Michaël Peeters2 Gilles Van Assche1 1 STMicroelectronics 2 NXP

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English - Date: 2013-09-19 10:37:36