Security firm Mandiant has released a database that allows any administrative password protected by Microsoft’s NTLM.v1 hash ...
Abstract: In this paper we present Grond, a Python implementation of a distributed hash table based on the Chord protocol that was used inside the cyber-physical contract framework Fides. We ...
Abstract: The linear-probing hash table is one of the oldest and most widely used data structures in computer science. However, linear probing famously comes with a major draw-back: as soon as the ...