「hash」の共起表現一覧(1語右で並び替え)
該当件数 : 215件
and he is one of the designers of the SANDstorm | hash, a submission to the NIST SHA-3 competition. |
oan her bed!" and "Sometimes when ah'm puffing | hash ah get a bird tae suck mah dong!". |
FORK-256 is a proposed | hash algorithm to withstand security holes that were |
iscovered a buffer overflow in the original MD6 | hash algorithm's reference implementation. |
computing project to find collisions in the MD5 | hash algorithm. |
r to those of their Commodore counterparts, the | hash algorithms were different, presumably to preven |
ing an effort to develop one or more additional | hash algorithms through a public competition, simila |
Tiger, and TIGER2), MACs (HMAC for all | hash algorithms), and public key algorithms (RSA, El |
n angel dust four times, used and sold cocaine, | hash and other drugs before the age of 14, when he b |
Both Rabbit | Hash and Lajitas are unincorporated towns where the |
Files are represented by their md5 | hash, and http-compliant file links can be exported, |
Not all attendees smoke | hash and neither are they expected or asked to. |
While there, he set up a shop dealing | hash and fell in love with a native girl. |
Dekay, Markus Schulz, Gatibu, John Lord Fonda, | Hash, Andres Calamaro y Ariel Rot, Placebo, The Pret |
If the first 20 bits of the | hash are zeros then this is an acceptable header. |
Hash Bash participants did not encounter significant | |
The 2009 | Hash Bash on April 4 celebrated medical marijuana's |
One day High Times got an invitation to the | Hash Bash in Ann Arbor, Michigan. |
Ra was a fixture of Ann Arbor's | Hash Bash, speaking out about the benefits of cannab |
The second annual | Hash Bash, in 1973, attracted approximately 3,000 pa |
Maher Shalal | Hash Baz |
Nakamura and occasional members of Maher Shalal | Hash Baz. |
Rev. W.A. | Hash became principal in 1923 and oversaw the accred |
tor against SMASH was discovered which left the | hash broken. |
Hash Brown (released 1963 by Philips Records as cata | |
l-known, artier films such as Old Koomooloo and | Hash Brown's. |
o orders it cooked rare, with a double order of | hash browns and a Cherry Coke. |
also a "breakfast" horseshoe that uses eggs and | hash browns. |
MD5 | hash calculation of files |
(However, even a secure password | hash cannot prevent brute-force attacks on weak pass |
y solve the problem of collisions with ordinary | hash chains by replacing the single reduction functi |
creating for each file a signature, typically a | hash coded version. |
Such a pair is called a cryptographic | hash collision. |
able to use differential cryptanalysis to find | hash collisions. |
Hash cookies are essentially the same as marijuana c | |
The length of the output | hash depends on the underlying block cipher used. |
Because LM | hash does not employ salt, a time-memory trade-off c |
A | hash filter creates a hash sum from data, typically |
message is received by an e-mail server with a | hash filter, the contents of the e-mail is converted |
In cryptography, Tiger is a cryptographic | hash function designed by Ross Anderson and Eli Biha |
In other words, there must exist a | hash function in F that colors any given k vertices |
discovered a method by which collisions in the | hash function used in Internet Protocol datagrams ma |
A minimal perfect | hash function F is order preserving if keys are give |
sche presented a practical attack on the Panama | hash function that generates a collision in 26 evalu |
ome tools use this technique with more than one | hash function so that the bit-field gets widened by |
ty by using collisions of the MD5 cryptographic | hash function in December 2008. |
The notion of 'balance' of a | hash function quantifies the resistance of the funct |
complexity 261, fewer than the 280 for an ideal | hash function of the same size. |
A | hash function adds a fixed-length tag to a message, |
is also claimed to be competitive with the NIST | hash function SHA-256 in both software and hardware |
on intended to construct a secure cryptographic | hash function (e.g. |
The NIST | hash function competition is an open competition hel |
To avoid this attack, the output length of the | hash function used for a signature scheme can be cho |
er some unknown and undesirable property of the | hash function used in the protocol to work. |
Main article: Cryptographic | hash function |
MurmurHash is a non-cryptographic | hash function suitable for general hash-based lookup |
"A Collision-free Cryptographic | Hash Function Based on Factorization". |
A perfect | hash function for the four names shown |
A minimal perfect | hash function for the four names shown |
NaSHA is a | hash function accepted as a first round SHA-3 candid |
A minimal perfect | hash function is a perfect hash function that maps n |
s, one can design a special-purpose (heuristic) | hash function that yields many fewer collisions than |
ruce Schneier and others he developed the Skein | hash function as a candidate for the NIST hash funct |
The primitive can be used both as a | hash function and a stream cipher. |
Both the block size of the | hash function and the output size are completely sca |
SMASH is a cryptographic | hash function which was created by Lars R. Knudsen. |
HAS-160 is a cryptographic | hash function designed for use with the Korean KCDSA |
A | hash function that maps names to integers from 0 to |
tion is most commonly realized using a suitable | hash function (or checksum algorithm). |
vings of 98% of memory in the case of using one | hash function (175 MB to 3 MB) and 92% when two hash |
A collision-free | hash function is a type of one-way function that for |
A | hash function must be able to process an arbitrary-l |
A cryptographic | hash function or a block cipher may be repeatedly ap |
ptography primitive which can be used both as a | hash function and a stream cipher. |
The following | hash function submissions were accepted for Round On |
MDC-2 is a | hash function based on a block cipher with a proof o |
Snefru is a cryptographic | hash function invented by Ralph Merkle in 1990 which |
successful collision attack on a cryptographic | hash function may compromise the security of compute |
Using a perfect | hash function is best in situations where there is a |
160-bit message digest algorithm (cryptographic | hash function) developed in Leuven, Belgium, by Hans |
a secret salt to the data, or using a universal | hash function). |
The fingerprint is created by a cryptographic | hash function, which condenses the public key down t |
Let h be a | hash function, and let k be a fixed integer. |
with extra zeros to the input block size of the | hash function, or the hash of the original key if it |
epresented by a number and it is passed to some | hash function. |
ng with a similar function to the cryptographic | hash function. |
he found new attacks on the SHA-1 cryptographic | hash function. |
HAVAL is a cryptographic | hash function. |
This article is about the cryptographic | hash function. |
MD6 Message-Digest Algorithm is a cryptographic | hash function. |
esult, TEA is especially bad as a cryptographic | hash function. |
imes called Meyer-Schilling) is a cryptographic | hash function. |
The random state is the 160-bit output of the | hash function. |
ber generator is based on the RIPEMD-160 secure | hash function. |
OKI97 block ciphers and the HAVAL cryptographic | hash function. |
ox game console, where the cipher was used as a | hash function. |
hing and spiral storage are examples of dynamic | hash functions that execute in constant time but rel |
Despite many proposals, few | hash functions based on modular arithmetic have with |
ed in the design and analysis of block ciphers, | hash functions and message authentication codes (MAC |
cryption and can operate as collision-resistant | hash functions designed by Sean O'Neil, Benjamin Git |
Not all uses of cryptographic | hash functions require random oracles: schemes that |
Cryptographic | hash functions |
Cryptographic | hash functions are believed to provide good hash fun |
Some of these space-efficient perfect | hash functions have been implemented in cmph library |
Order-preserving minimal perfect | hash functions require necessarily Ω(n log n) bits t |
A few | hash functions allow a rolling hash to be computed v |
e hashing, a collection of techniques for using | hash functions to map large sets of objects down to |
Cryptographic | hash functions, while still not providing security a |
In the context of cryptographic | hash functions, the inability of an adversary to com |
, including the R-MAC scheme, the SHA-1 and MD2 | hash functions, and at least a dozen block ciphers: |
Unlike MD5, but like most modern cryptographic | hash functions, HAVAL can produce hashes of differen |
Most widely used | hash functions, including MD5, SHA-1 and SHA-2 use t |
e computationally expensive to compute multiple | hash functions, but a related version of MinHash sch |
es publicly known attacks against cryptographic | hash functions. |
& asymmetric cryptography; digital signatures; | hash functions; bit-commitment; and signature proofs |
Other sports teams in the town include | Hash Harriers Running Club and many skittles and dar |
The S&M Man" is well known and commonly sung by | Hash House Harriers, Rugby union players, fraternity |
This is known as a drinking song by | Hash House Harriers and by rugby players. |
Spliff" (popular in Europe), tobacco mixed with | hash in a chillum (India), or cannabis rolled in tob |
This is often useful for constructing a single | hash index from a pair (or more) of input numbers. |
izzle includes built-in support for B+ tree and | Hash indexes. |
To compute a Keccak | hash, initialize the state to 0, pad the input, and |
MASH-1 (Modular Arithmetic Secure | Hash) is a hash function based on modular arithmetic |
Spectral | hash is insecure; a method exists to generate arbitr |
The unique user | hash is used to identify the client. |
A rolling | hash is a hash function where the input is hashed in |
The avalanche behavior of this | hash is shown on the right. |
Iceolator | hash is hashish made using an ice/water extraction p |
All About | Hash is a 1940 Our Gang short comedy film directed b |
This is necessary if the generation of the LM | hash is disabled (this is default for Windows Vista) |
The SANDstorm | hash is a cryptographic hash function designed in 20 |
Jenkins's one-at-a-time | hash is adapted here from a WWW page by Bob Jenkins, |
as also recorded with Bardo Pond under the name | Hash Jar Tempo. |
en elected mayors of small towns such as Rabbit | Hash, Kentucky, whose mayor is a black lab named Jun |
Similar events in 2004 in Rabbit | Hash, Kentucky, elected Junior Cochran, a black Lab, |
t owned and operated by Duke Energy near Rabbit | Hash, Kentucky. |
erted_to_string" which is a legal argument in a | hash key assignment. |
Using, for example, a weak | hash map, one can store in the cache the various ref |
e article about the building (sign below with a | hash mark and four tildes) |
Not to be confused with | hash mark (disambiguation). |
the new rule that brought the ball back to the | hash marks after every play helped Manders (and all |
The indicator includes | hash marks to indicate "wings level" flight and stan |
IKeys consist of 14 characters resulting from a | hash of the connectivity information of the InChI, f |
res a preimage attack, as well as access to the | hash of the original password (typically in the shad |
It then computes the 160 bit SHA-1 | hash of the header. |
ribed it as "an architectural scarecrow" and "a | hash of ornamental details". |
worth noting that extracts such as hashish and | hash oil can contain more THC than skunk or high pot |
vels available, like finest quality hashish, or | hash oil with even higher levels. |
Hash oil is traditionally a dark, viscous liquid. | |
Hash oil is a resinous matrix of cannabinoids produc | |
from Cambodia where high quality marijuana and | hash oil are used. |
Hash oil is a concentrated product with a high THC c | |
Related honey oil is a specific type of | hash oil made from the more potent parts of the cann |
England were getting nicked for having a bit of | hash on them. |
l password or passphrase typically requires one | hash operation. |
products usually have more THC than bud, water | hash or sieved hash, but none have tested as high as |
Ice-water separation (also known as water | hash, or bubble hash) is an extraction technique for |
The first 72 bits of the | hash output are encoded with a modified base64 schem |
Avalanche behavior of Jenkins One-at-a-time | hash over 3-byte keys |
pposed to composite variables like array, list, | hash, record, etc. |
l subroutine that accepts arguments as a single | hash reference and returns a reference to an array o |
It has been proved that any minimal perfect | hash scheme requires at least 1.44 bits/key. |
ns, the algorithm is recursively applied to the | hash sets to detect which blocks of hashes have chan |
um Clearinghouse (also referred to as DCC) is a | hash sharing method of spam email detection. |
means that by relatively small additions to the | hash size, we can quickly reach high security. |
With this in mind, Merkle tree | hash structures exploit full potential of such hardw |
s will succeed, and leaks information about the | hash subkey, H. |
If this sum corresponds to the | hash sum of another e-mail which has been categorize |
s a stylized symbol for the Earth preceded by a | hash symbol or number sign, referring to Earth First |
A distributed | hash table is a better basis for implementing such a |
Any collision in a | hash table increases the average cost of lookup oper |
The distributed | hash table protocol Koorde uses a De Bruijn graph. |
Many programming languages provide | hash table functionality, either as built-in associa |
an also be eliminated by the use of distributed | hash table technology. |
e organization is working with RSC to develop a | hash table resolver for InChIKeys, shorter hashed fo |
g, they improve other search tools based on the | hash table functionality only. |
e name is suggested by a similarity to a closed | hash table.) |
By using distributed | hash tables searching performance is greatly improve |
Hash tables do not preserve ordering and therefore c | |
rchitectures which includes work on distributed | hash tables such as Chord and wireless mesh networks |
Hash tables in various guises, in Lisp, Perl, Python | |
A data structure which "combines features of | hash tables and LC-tries in order to perform efficie |
l) enumeration of the items in key order, which | hash tables do not provide. |
Freenet, only with a heavier use of distributed | hash tables. |
s and disadvantages over their main competitor, | hash tables. |
me the No. 1 trending topic on Twitter with the | hash tag #kushandorangejuice, and "Kush and Orange J |
was neglected by parents that “would rather buy | hash than toys” into a nationally celebrated musicia |
ashion, using a progressively modified state to | hash the key and replace bits of state, until all su |
ble estimates of the time needed to compute the | hash, this would take about 1 second to find. |
almost any change to a file will cause its MD5 | hash to also change, the MD5 hash is commonly used t |
different board positions will almost certainly | hash to different values; however longer bitstrings |
Tiger is frequently used in Merkle | hash tree form, where it is referred to as TTH (Tige |
the independent music-focused podcasts Accident | Hash, U-Turn Cafe, and the new media podcast, Managi |
mantic Web practice (the other being the use of | hash URIs). |
al used in operating systems (e.g., OpenVMS) to | hash user passwords. |
The size of a Tiger | hash value is 192 bits. |
こんにちは ゲスト さん
ログイン |
Weblio会員(無料)になると 検索履歴を保存できる! 語彙力診断の実施回数増加! |
こんにちは ゲスト さん
ログイン |
Weblio会員(無料)になると 検索履歴を保存できる! 語彙力診断の実施回数増加! |