「Hash」の共起表現一覧(2語左で並び替え)
該当件数 : 211件
The fingerprint is created by a cryptographic | hash function, which condenses the public key down t |
In cryptography, Tiger is a cryptographic | hash function designed by Ross Anderson and Eli Biha |
Using, for example, a weak | hash map, one can store in the cache the various ref |
"cache" of packages indexed by a cryptographic | hash). |
A distributed | hash table is a better basis for implementing such a |
a secret salt to the data, or using a universal | hash function). |
l subroutine that accepts arguments as a single | hash reference and returns a reference to an array o |
HAVAL is a cryptographic | hash function. |
FNV is not a cryptographic | hash. |
MurmurHash is a non-cryptographic | hash function suitable for general hash-based lookup |
Such a pair is called a cryptographic | hash collision. |
The size of a Tiger | hash value is 192 bits. |
A perfect | hash function for the four names shown |
Computation of a standard | hash value for the record. |
MD6 Message-Digest Algorithm is a cryptographic | hash function. |
A rolling | hash is a hash function where the input is hashed in |
months, i have updated the link with a working | hash & hash oil forum. |
esult, TEA is especially bad as a cryptographic | hash function. |
e name is suggested by a similarity to a closed | hash table.) |
imes called Meyer-Schilling) is a cryptographic | hash function. |
A few | hash functions allow a rolling hash to be computed v |
SMASH is a cryptographic | hash function which was created by Lars R. Knudsen. |
HAS-160 is a cryptographic | hash function designed for use with the Korean KCDSA |
tion is most commonly realized using a suitable | hash function (or checksum algorithm). |
A collision-free | hash function is a type of one-way function that for |
A cryptographic | hash function or a block cipher may be repeatedly ap |
To compute a Keccak | hash, initialize the state to 0, pad the input, and |
Snefru is a cryptographic | hash function invented by Ralph Merkle in 1990 which |
successful collision attack on a cryptographic | hash function may compromise the security of compute |
This is often useful for constructing a single | hash index from a pair (or more) of input numbers. |
FORK-256 is a proposed | hash algorithm to withstand security holes that were |
Using a perfect | hash function is best in situations where there is a |
s will succeed, and leaks information about the | hash subkey, H. |
es publicly known attacks against cryptographic | hash functions. |
oan her bed!" and "Sometimes when ah'm puffing | hash ah get a bird tae suck mah dong!". |
160-bit message digest algorithm (cryptographic | hash function) developed in Leuven, Belgium, by Hans |
All About | Hash is a 1940 Our Gang short comedy film directed b |
different board positions will almost certainly | hash to different values; however longer bitstrings |
To make them, large amounts of | hash (typically half a gram to as much as a gram a c |
complexity 261, fewer than the 280 for an ideal | hash function of the same size. |
, including the R-MAC scheme, the SHA-1 and MD2 | hash functions, and at least a dozen block ciphers: |
ribed it as "an architectural scarecrow" and "a | hash of ornamental details". |
Ra was a fixture of Ann Arbor's | Hash Bash, speaking out about the benefits of cannab |
MASH-1 (Modular Arithmetic Secure | Hash) is a hash function based on modular arithmetic |
pposed to composite variables like array, list, | hash, record, etc. |
Main article: Cryptographic | hash function |
cryption and can operate as collision-resistant | hash functions designed by Sean O'Neil, Benjamin Git |
en elected mayors of small towns such as Rabbit | Hash, Kentucky, whose mayor is a black lab named Jun |
The primitive can be used both as a | hash function and a stream cipher. |
ance, the signature of a set may be seen as its | hash value. |
Ice-water separation (also known as water | hash, or bubble hash) is an extraction technique for |
ptography primitive which can be used both as a | hash function and a stream cipher. |
ox game console, where the cipher was used as a | hash function. |
Not all attendees smoke | hash and neither are they expected or asked to. |
Let h be a | hash function, and let k be a fixed integer. |
Because LM | hash does not employ salt, a time-memory trade-off c |
England were getting nicked for having a bit of | hash on them. |
It then computes the 160 bit SHA-1 | hash of the header. |
ed in the design and analysis of block ciphers, | hash functions and message authentication codes (MAC |
Both Rabbit | Hash and Lajitas are unincorporated towns where the |
products usually have more THC than bud, water | hash or sieved hash, but none have tested as high as |
s a stylized symbol for the Earth preceded by a | hash symbol or number sign, referring to Earth First |
"A Collision-free Cryptographic | Hash Function Based on Factorization". |
ble estimates of the time needed to compute the | hash, this would take about 1 second to find. |
e computationally expensive to compute multiple | hash functions, but a related version of MinHash sch |
Computing the | hash values in a rolling fashion is done as follows. |
Not to be confused with | hash mark (disambiguation). |
r to those of their Commodore counterparts, the | hash algorithms were different, presumably to preven |
e organization is working with RSC to develop a | hash table resolver for InChIKeys, shorter hashed fo |
& asymmetric cryptography; digital signatures; | hash functions; bit-commitment; and signature proofs |
also a "breakfast" horseshoe that uses eggs and | hash browns. |
In other words, there must exist a | hash function in F that colors any given k vertices |
A data structure which "combines features of | hash tables and LC-tries in order to perform efficie |
Tiger, and TIGER2), MACs (HMAC for all | hash algorithms), and public key algorithms (RSA, El |
e hashing, a collection of techniques for using | hash functions to map large sets of objects down to |
IKeys consist of 14 characters resulting from a | hash of the connectivity information of the InChI, f |
they are simply prefixes of the full Tiger/192 | hash value. |
rounds (3, 4, or 5) to be used to generate the | hash. |
worth noting that extracts such as hashish and | hash oil can contain more THC than skunk or high pot |
vels available, like finest quality hashish, or | hash oil with even higher levels. |
OKI97 block ciphers and the HAVAL cryptographic | hash function. |
erted_to_string" which is a legal argument in a | hash key assignment. |
discovered a method by which collisions in the | hash function used in Internet Protocol datagrams ma |
Tiger is frequently used in Merkle | hash tree form, where it is referred to as TTH (Tige |
Any collision in a | hash table increases the average cost of lookup oper |
Similar events in 2004 in Rabbit | Hash, Kentucky, elected Junior Cochran, a black Lab, |
The indicator includes | hash marks to indicate "wings level" flight and stan |
NaSHA is a | hash function accepted as a first round SHA-3 candid |
um Clearinghouse (also referred to as DCC) is a | hash sharing method of spam email detection. |
MDC-2 is a | hash function based on a block cipher with a proof o |
almost any change to a file will cause its MD5 | hash to also change, the MD5 hash is commonly used t |
m based on Mark Adler's adler-32 as its rolling | hash. |
Avalanche behavior of Jenkins One-at-a-time | hash over 3-byte keys |
Jenkins's one-at-a-time | hash is adapted here from a WWW page by Bob Jenkins, |
l-known, artier films such as Old Koomooloo and | Hash Brown's. |
Many programming languages provide | hash table functionality, either as built-in associa |
tor against SMASH was discovered which left the | hash broken. |
Dekay, Markus Schulz, Gatibu, John Lord Fonda, | Hash, Andres Calamaro y Ariel Rot, Placebo, The Pret |
Nakamura and occasional members of Maher Shalal | Hash Baz. |
Maher Shalal | Hash Baz |
s and disadvantages over their main competitor, | hash tables. |
from Cambodia where high quality marijuana and | hash oil are used. |
ty by using collisions of the MD5 cryptographic | hash function in December 2008. |
With this in mind, Merkle tree | hash structures exploit full potential of such hardw |
A minimal perfect | hash function F is order preserving if keys are give |
A minimal perfect | hash function for the four names shown |
A minimal perfect | hash function is a perfect hash function that maps n |
It has been proved that any minimal perfect | hash scheme requires at least 1.44 bits/key. |
Order-preserving minimal perfect | hash functions require necessarily Ω(n log n) bits t |
Spliff" (popular in Europe), tobacco mixed with | hash in a chillum (India), or cannabis rolled in tob |
Unlike MD5, but like most modern cryptographic | hash functions, HAVAL can produce hashes of differen |
ing an effort to develop one or more additional | hash algorithms through a public competition, simila |
t owned and operated by Duke Energy near Rabbit | Hash, Kentucky. |
Quebec Gold produces a deep, near black | hash. |
-image will depend exponentially on size of the | hash value”. |
Freenet, only with a heavier use of distributed | hash tables. |
In the context of cryptographic | hash functions, the inability of an adversary to com |
hing and spiral storage are examples of dynamic | hash functions that execute in constant time but rel |
The first 72 bits of the | hash output are encoded with a modified base64 schem |
The notion of 'balance' of a | hash function quantifies the resistance of the funct |
To avoid this attack, the output length of the | hash function used for a signature scheme can be cho |
er some unknown and undesirable property of the | hash function used in the protocol to work. |
Not all uses of cryptographic | hash functions require random oracles: schemes that |
The avalanche behavior of this | hash is shown on the right. |
ntent compared to traditional methods of making | hash. |
Both the block size of the | hash function and the output size are completely sca |
The random state is the 160-bit output of the | hash function. |
If the first 20 bits of the | hash are zeros then this is an acceptable header. |
with extra zeros to the input block size of the | hash function, or the hash of the original key if it |
an also be eliminated by the use of distributed | hash table technology. |
rchitectures which includes work on distributed | hash tables such as Chord and wireless mesh networks |
g, they improve other search tools based on the | hash table functionality only. |
Many game engines store only the | hash values in the transposition table, omitting the |
al used in operating systems (e.g., OpenVMS) to | hash user passwords. |
s MurmurHash3, which yields a 32-bit or 128-bit | hash value and is optimized for Intel processors. |
o orders it cooked rare, with a double order of | hash browns and a Cherry Coke. |
l) enumeration of the items in key order, which | hash tables do not provide. |
iscovered a buffer overflow in the original MD6 | hash algorithm's reference implementation. |
the independent music-focused podcasts Accident | Hash, U-Turn Cafe, and the new media podcast, Managi |
Despite many proposals, few | hash functions based on modular arithmetic have with |
was neglected by parents that “would rather buy | hash than toys” into a nationally celebrated musicia |
There's no requirement that | hash values be consistent between different Java imp |
l password or passphrase typically requires one | hash operation. |
It requires a | hash value at least twice as long as that required f |
Rev. W.A. | Hash became principal in 1923 and oversaw the accred |
ber generator is based on the RIPEMD-160 secure | hash function. |
The second annual | Hash Bash, in 1973, attracted approximately 3,000 pa |
on intended to construct a secure cryptographic | hash function (e.g. |
(However, even a secure password | hash cannot prevent brute-force attacks on weak pass |
below) and sends it back to Blizzard servers as | hash values to be compared to those of known cheatin |
he found new attacks on the SHA-1 cryptographic | hash function. |
While there, he set up a shop dealing | hash and fell in love with a native girl. |
n angel dust four times, used and sold cocaine, | hash and other drugs before the age of 14, when he b |
This is known as a drinking song by | Hash House Harriers and by rugby players. |
Some of these space-efficient perfect | hash functions have been implemented in cmph library |
s, one can design a special-purpose (heuristic) | hash function that yields many fewer collisions than |
ashion, using a progressively modified state to | hash the key and replace bits of state, until all su |
urce or binary package is represented by such a | hash. |
The S&M Man" is well known and commonly sung by | Hash House Harriers, Rugby union players, fraternity |
ome tools use this technique with more than one | hash function so that the bit-field gets widened by |
ng with a similar function to the cryptographic | hash function. |
as also recorded with Bardo Pond under the name | Hash Jar Tempo. |
game-winning 37-yard field goal from the right | hash. |
hashing each one and comparing it to the input | hash. |
sche presented a practical attack on the Panama | hash function that generates a collision in 26 evalu |
is also claimed to be competitive with the NIST | hash function SHA-256 in both software and hardware |
and he is one of the designers of the SANDstorm | hash, a submission to the NIST SHA-3 competition. |
The NIST | hash function competition is an open competition hel |
The 2009 | Hash Bash on April 4 celebrated medical marijuana's |
Let H be the previous | hash value. |
The number is encoded in the textual | hash. |
This article is about the cryptographic | hash function. |
The SANDstorm | hash was accepted into the first round of the NIST h |
ruce Schneier and others he developed the Skein | hash function as a candidate for the NIST hash funct |
xample, the strings "Ea" and "FB" have the same | hash value. |
computing project to find collisions in the MD5 | hash algorithm. |
The length of the output | hash depends on the underlying block cipher used. |
A digest function updates the intermediate | hash value by processing the input blocks in turn. |
The distributed | hash table protocol Koorde uses a De Bruijn graph. |
enated to form a 16-byte value, which is the LM | hash. |
This is necessary if the generation of the LM | hash is disabled (this is default for Windows Vista) |
The SANDstorm | hash is a cryptographic hash function designed in 20 |
The following | hash function submissions were accepted for Round On |
f_data, have the same number of bits as the FNV | hash. |
Files are represented by their md5 | hash, and http-compliant file links can be exported, |
epresented by a number and it is passed to some | hash function. |
If this sum corresponds to the | hash sum of another e-mail which has been categorize |
able to use differential cryptanalysis to find | hash collisions. |
within sandwiches and sometimes is used to make | hash. |
res a preimage attack, as well as access to the | hash of the original password (typically in the shad |
ns, the algorithm is recursively applied to the | hash sets to detect which blocks of hashes have chan |
the new rule that brought the ball back to the | hash marks after every play helped Manders (and all |
An ordinary trie used to store | hash values, for example, in an implementation of a |
One day High Times got an invitation to the | Hash Bash in Ann Arbor, Michigan. |
means that by relatively small additions to the | hash size, we can quickly reach high security. |
Other sports teams in the town include | Hash Harriers Running Club and many skittles and dar |
izzle includes built-in support for B+ tree and | Hash indexes. |
Related honey oil is a specific type of | hash oil made from the more potent parts of the cann |
こんにちは ゲスト さん
ログイン |
Weblio会員(無料)になると 検索履歴を保存できる! 語彙力診断の実施回数増加! |
こんにちは ゲスト さん
ログイン |
Weblio会員(無料)になると 検索履歴を保存できる! 語彙力診断の実施回数増加! |