Home - Sports - Hashing |
Page 2 21-40 of 74 Back | 1 | 2 | 3 | 4 | Next 20 |
21. Libketama - A Consistent Hashing Algo For Memcache Clients â RJâs Jour Ketama is an implementation of a consistent hashing algorithm, meaning you can add or remove servers from the memcached pool without causing a complete http://www.last.fm/user/RJ/journal/2007/04/10/392555/ | |
|
22. Portable PHP Password Hashing Framework A portable public domain password hashing framework for use in PHP applications. Tested with PHP 3, 4, and 5. http://www.openwall.com/phpass/ | |
|
23. How To: Hash Data With Salt (C#/VB.NET) Sample Code hashing data in C .NET and VB.NET using MD5, SHA1, SHA256, SHA384, and SHA512 algoritnms. http://www.obviex.com/samples/hash.aspx | |
|
24. Hash Table Applet This is a Java application that lets you experiment and compare exponential and double hashing on clustered data. You can input a cluster size between 1% http://www.jea.acm.org/CODE/Vol2Nbr3/hash.html | |
|
25. Hashing InChIs The InChI team has announced a proposal for a standardized InChI hashing mechanism. This would create a free, fixedlength, alphanumeric molecular http://depth-first.com/articles/2007/05/09/hashing-inchis | |
|
26. MD5 Hashing Function - Version 1.0 The following example shows a valid MD5 resinfo extension with two MD5 hashes of the referenced information resource. The first without a date, http://www.w3.org/TR/1998/REC-DSig-label/MD5-1_0 | |
|
27. Piecewise Hashing - Forensics Wiki Piecewise hashing is a hashing technique to divide an input into chunks and hash each chunk separately. It was invented by Nick Harbour in dcfldd to improve http://www.forensicswiki.org/index.php?title=Piecewise_hashing |
28. Entity Crisis: Spatial Hashing A spatial index (in this example, a Spatial Hash / Hash Map) stores all object positions, and can quickly tell you what objects _might_ be colliding in a http://entitycrisis.blogspot.com/2007/11/spatial-hashing.html | |
|
29. Animation Such a function is known as a perfect hashing function it maps each key to a Unfortunately, finding a perfect hashing function is not always possible. http://www.cs.pitt.edu/~kirk/cs1501/animations/Hashing.html | |
|
30. Security Briefs: Hashing Passwords, The AllowPartiallyTrustedCallers Attribute A cryptographic hash algorithm like SHA1 or MD5 is a sophisticated one-way function that takes some input and produces a hash value as output, http://msdn2.microsoft.com/en-us/magazine/cc164107.aspx | |
|
31. RFC 2104 HMAC: Keyed-Hashing For Message Authentication HMAC Keyedhashing for Message Authentication. H. Krawczyk, M. Bellare, R. Canetti. February 1997. http://tools.ietf.org/html/rfc2104 | |
|
32. The Guide To Hashing In Korea, Hash House Harriers Korea Hasher s Information Resource, National and Regional Hash House Harriers Link Page. All the resources needed to hash around the world. http://gotothehash.net/korea.html | |
|
33. Hashraleigh.com - Hashing Doesn't Suck. When and where to run with the Carolina Larrikins Hash House Harriers, and who to ask about them, a club running pickup trails in the Triangle area. http://www.hashraleigh.com/ | |
|
34. Hashing Concepts And The Java Programming Language Java, a new object oriented programming language, includes primitive hash functions in the language for each of the base types. However it provides no clues http://www.serve.net/buz/hash.adt/java.000.html | |
|
35. Web Caching With Consistent Hashing In this paper, we offer a new web caching strategy based on consistent hashing. Consistent hashing provides an alternative to multicast and directory http://www8.org/w8-papers/2a-webserver/caching/paper2.html |
36. Collision-Resistant Hashing Towards Making UOWHFs Practical Abstract Recent attacks on the cryptographic hash functions MD4 and MD5 make it clear that (strong) collisionresistance is a hard-to-achieve goal. http://www.cs.ucsd.edu/~mihir/papers/tcr-hash.html | |
|
37. Md5 Hashing Class Utility This class computes MD5 hashes. // Manually translated by Jon Howell buf is where the hash accumulates. long bits; // This is the count of bits hashed http://www.jonh.net/~jonh/md5/MD5.java | |
|
38. Hashing In Forth hashing provides a fast way to search a large, unsorted data set at the cost of extra memory. Robert Sedgewick, in his book Algorithms, concisely describes http://www.forth.org/fd/hash.html | |
|
39. Consistent Hashing And Random Trees Robert Devine, Design and Implementation of DDH A Distributed Dynamic hashing Algorithm, Proceedings of the 4th International Conference on Foundations of http://portal.acm.org/citation.cfm?id=258660 |
40. Brian Jones: Open XML Formats : Improvements In Password Hashing There were a number of comments raised by national bodies about the password hashing (encryption) support defined in Open XML. There were some extra hurdles http://blogs.msdn.com/brian_jones/archive/2008/01/23/improvements-in-password-ha | |
|
Page 2 21-40 of 74 Back | 1 | 2 | 3 | 4 | Next 20 |