intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Hash functions

Xem 1-20 trên 82 kết quả Hash functions
  • The paper proposes a type of block cipher algorithm based on cryptographic hash function and public key cryptography. The algorithm proposed here is capable of verifying the origin and integrity of the encrypted message. On the other hand, establishing a shared secret key between the sender/encryptor and the receiver/decryptor can be done for each message separately.

    pdf11p visergeyne 18-06-2024 3 0   Download

  • Ebook Applied cryptanalysis: Breaking ciphers in the real world presents the following content: Chapter 1 classic ciphers, chapter 2 World War II ciphers, chapter 3 stream ciphers, chapter 4 block ciphers, chapter 5 hash functions, chapter 6 public key systems, chapter 7 public key attacks.

    pdf425p zizaybay1103 29-05-2024 2 2   Download

  • Ebook "Cryptography and security services: Mechanisms and applications" presents the following content: Chapter 1 introduction, chapter 2 ASN.1 encoding, chapter 3 random number generation, chapter 4 advanced encryption standard, chapter 5 hash functions, chapter 6 message - authentication code algorithms, chapter 7 encrypt and authenticate modes, chapter 8 large integer arithmetic, chapter 9 public key algorithms.

    pdf446p zizaybay1103 29-05-2024 4 2   Download

  • Lecture C programming basic: Week 14. This lesson provides students with content about: dictionary ADT; hash table; hash functions; compression maps; collision handling; exercises;... Please refer to the detailed content of the lecture!

    pdf48p codabach1016 03-05-2024 1 0   Download

  • Lecture Data structure and Algorithm basic lab: Week 14. This lesson provides students with content about: dictionary ADT; hash table; hash functions; hash code maps; compression maps; data structure for chaining; collision handling; exercises;... Please refer to the detailed content of the lecture!

    pdf48p codabach1016 03-05-2024 3 0   Download

  • Lecture Data structures and Algorithms: Week 14 (Lesson 14). This lesson provides students with content about: dictionary ADT; dictionary ADT methods; key-indexed dictionaries; hash table; hash functions; compression maps; collision handling; exercises;... Please refer to the detailed content of the lecture!

    pdf41p codabach1016 03-05-2024 1 0   Download

  • Part 1 book "Internet security - Cryptographic principles algorithms protocols" includes content: Internetworking and layered models; tcp ip suite and internet stack protocols; symmetric block ciphers; hash function, message digest and message authentication code, asymmetric public key cryptosystems.

    pdf221p longtimenosee08 31-03-2024 5 1   Download

  • The paper proposes a type of block cipher scheme based on cryptographic hash function and public key cryptography. The scheme proposed here is capable of verifying the origin and integrity of the encrypted message. On the other hand, establishing a shared secret key between the sender/encryptor and the receiver/decryptor can be done for each message separately.

    pdf20p vigojek 02-02-2024 2 0   Download

  • This paper presents a model of using smart electronic meters and network tools to store information about power, price, and customer code in information blocks of Blockchain applications to manage electricity bills. Price transactions will be stored as a data block.

    pdf8p viisac 15-09-2023 9 3   Download

  • Ebook Information security: Principles and practice includes contents: Chapter 1: introduction; chapter 2: classic cryptography; chapter 3: symmetric key crypto; chapter 4: public key crypto; chapter 5: hash functions; chapter 6: advanced cryptanalysis; chapter 7: authentication; chapter 8: authorization; chapter 9: authentication protocols; chapter 10: real-world protocols; chapter 11: software flaws and malware; chapter 12: insecurity in software; chapter 13: os and security.

    pdf413p haojiubujain06 05-09-2023 4 3   Download

  • Continued part 1, part 2 of ebook "Compiler design in C" presents the following content: code generation; the virtual machine; memory organization; variable declarations; optimization strategies; parser optimizations; linear (peephole) optimizations; structural optimizations; common-subexpression elimination; database maintenance-hashing; miscellaneous functions; grammatical transformations;...

    pdf524p dieptieuung 14-07-2023 7 4   Download

  • Lecture "Data structures and algorithms: Chapter 9 - Hash" provide students with knowledge about: Basic concepts; Hash functions: Direct Hashing, Modulo division, Digit extraction, Mid-square, Mid-square, Folding, Rotation, Pseudo-random; Collision resolution. Please refer to the detailed content of the lecture!

    pdf58p phuogchi205 07-03-2023 10 6   Download

  • Bài giảng An toàn thông tin: Chương 6 Xác thực và toàn vẹn thông tin, được biên soạn gồm các nội dung chính sau: Nhu cầu xác thực thông điệp; Mã xác thực thông điệp (MAC); Xác thực thông điệp dùng RSA; Hàm băm (hash function); Chữ ký số (Digital Signature); Chứng thư số (Digital Certificate); Hạ tầng khóa công khai (PKI). Mời các bạn cùng tham khảo!

    pdf35p trangxanh0906 12-01-2023 11 9   Download

  • Lecture "On safety and security of information systems: Cryptographic hash funtionns" provide students with knowledge about: Hash function; Applications of cryptographic hash functions; Simple hash functions; Requirements and security;... Please refer to the detailed content of the lecture!

    pdf22p hoabingan205 12-12-2022 11 5   Download

  • In this paper, we propose a design method for the signature scheme based on ring structure Zn. Our signature schemes are more secure, generate signatures at a faster rate than that of the ElGamal scheme and its variants. Moreover, our approaches also overcome some disadvantages of some similar signature schemes on ring Zn. For these advantages, they are fully applicable in practice.

    pdf10p viwmotors 02-12-2022 18 3   Download

  • Lecture Data Structures: Lesson 41 provide students with knowledge about implementation: TowerNode; implementation: QuadNode; skip lists with quad nodes; performance of skip lists; implementation 5: AVL tree; implementation 6: hashing; example hash functions;...

    ppt18p hanthienngao 15-04-2022 18 1   Download

  • Lecture Data Structures: Lesson 42 provide students with knowledge about example hash functions; collision; find something to do with the second and subsequent values that hash to this same location; solution for handling collisions; open addressing and closed hashing;...

    ppt18p hanthienngao 15-04-2022 9 1   Download

  • Bài giảng Cấu trúc dữ liệu và giải thuật: Chương 10 giới thiệu nội dung về Bảng băm.Hàm băm(Hash Functions); Sự đụng độ (collision) và các phương pháp kết nối. Kính mời quý đọc giả tham khảo nội dung chi tiết.

    pdf61p redrose24 11-04-2022 25 4   Download

  • Lecture FinTech - Chapter 7: Basics of cryptography and blockchain, after studying this section will help you understand: Cryptographic hash function; Public key cryptography and digital signature; Zero-knowledge proof...

    pdf35p huangminghao_1902 27-02-2022 7 1   Download

  • Bài giảng Cấu trúc dữ liệu cung cấp kiến thức và rèn luyện kỹ năng thực hành cấu trúc dữ liệu cho sinh viên. Bài giảng gồm có 4 chương như sau: Chương I khái niệm liên quan đến cấu trúc dữ liệu, chương II các kiểu dữ liệu trừu tượng cơ bản, chương III cây (tree), chương IV bảng băm (hash table). Mời các bạn cùng tham khảo để biết thêm nội dung chi tiết.

    pdf80p cucngoainhan7 08-02-2022 21 3   Download

CHỦ ĐỀ BẠN MUỐN TÌM

TOP DOWNLOAD
207 tài liệu
1444 lượt tải
320 tài liệu
1227 lượt tải
ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2