DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» Checksum
Checksum
Hash Functions
SELECTION of CYCLIC REDUNDANCY CODE and CHECKSUM March 2015 ALGORITHMS to ENSURE CRITICAL DATA INTEGRITY 6
Linear-XOR and Additive Checksums Don't Protect Damgård-Merkle
Hash (Checksum)
Cryptographic Checksum
FIPS 198, the Keyed-Hash Message Authentication Code (HMAC)
Table of Contents Local Transfers
The Effectiveness of Checksums for Embedded Control Networks
Cryptography Hash Functions
Intel® Quickassist Technology: Using Adler-32 Checksum and CRC32
The Zettabyte File System
Data-Integrity
The Last Word in File Systems
Monitoring Framework for B-Tree File System B.Tech
Data Integrity
The Last Word in File Systems Page 1
End-To-End Data Integrity for File Systems: a ZFS Case Study
A Three-Layer Visual Hash Function Using Adler-32
Top View
Keying Hash Functions for Message Authentication
Cryptographic Hash Functions
Cryptanalysis of a Class of Cryptographic Hash Functions
An Analysis of Compare-By-Hash
Living with BTRFS
Data Integrity During a File Copy
Data Integrity and Protection
Technical Specification Nordea File Protection with HMAC SHA256-128
An Overview of Cryptographic Hash Functions MD-5 and SHA
Message Authentication Using Hash Functions— the HMAC Construction
Cryptographic Hash Functions
Verifyfs in Btrfs Style (Btrfs End to End Data Integrity)
INFORMATION THEORY and CODING What Is Information Theory
Checksum and CRC Data Integrity Techniques for Aviation
Document Title Requirements on Flash Test Document Owner AUTOSAR Document Responsibility AUTOSAR Document Identification No 260
New Generic Attacks Against Hash-Based Macs
On Hash Functions Using Checksums
An Analysis of Data Corruption in the Storage Stack
FIPS PUB 198-1, the Keyed-Hash Message Authentication Code
Linux, Btrfs, ZFS, Ext4, Performance
The Effectiveness of Checksums for Embedded Networks
The ZFS Filesystem One Day Workshop — SANOG 33
ZFS Overview and Design Guide
Cyclic Redundancy Check 1 Cyclic Redundancy Check