Statements (68)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:currency
|
gptkbp:bfsLayer |
4
|
gptkbp:bfsParent |
gptkb:Aeternity
|
gptkbp:based_on |
cuckoo hashing
|
gptkbp:designed_by |
gptkb:D._J._Bernstein
|
gptkbp:has_programs |
gptkb:software_framework
|
https://www.w3.org/2000/01/rdf-schema#label |
Cuckoo Cycle
|
gptkbp:introduced |
gptkb:2014
|
gptkbp:is_adopted_by |
gptkb:Educational_Institution
data protection cryptographic libraries |
gptkbp:is_analyzed_in |
research papers
|
gptkbp:is_available_on |
gptkb:project
|
gptkbp:is_compared_to |
gptkb:SHA-256
|
gptkbp:is_compatible_with |
various architectures
|
gptkbp:is_considered |
security audits
risk assessments future cryptographic standards |
gptkbp:is_considered_as |
a secure hash function
|
gptkbp:is_discussed_in |
gptkb:academic_conferences
cryptography forums |
gptkbp:is_documented_in |
technical specifications
academic papers |
gptkbp:is_evaluated_by |
robustness
speed and efficiency cryptographers security researchers security metrics cryptanalysis studies |
gptkbp:is_implemented_in |
gptkb:language
multiple programming languages |
gptkbp:is_influenced_by |
gptkb:Merkle-Damgård_construction
|
gptkbp:is_integrated_with |
gptkb:mobile_application
other cryptographic functions |
gptkbp:is_known_for |
collision resistance
|
gptkbp:is_optimized_for |
gptkb:benchmark
|
gptkbp:is_part_of |
gptkb:currency
encryption algorithms secure communication protocols cryptographic primitives secure data storage solutions data encryption frameworks NIST hash function competition secure hashing solutions |
gptkbp:is_promoted_by |
workshops
security experts |
gptkbp:is_recognized_by |
cryptographic organizations
|
gptkbp:is_recognized_for |
its efficiency
|
gptkbp:is_related_to |
hash table
|
gptkbp:is_supported_by |
community contributions
research funding |
gptkbp:is_tested_for |
gptkb:municipality
scalability performance benchmarks adversarial attacks real-world data known attacks |
gptkbp:is_used_by |
various software projects
|
gptkbp:is_used_for |
cryptographic applications
|
gptkbp:is_used_in |
digital signatures
|
gptkbp:is_utilized_in |
secure transactions
data integrity checks password hashing cloud computing security secure messaging. |
gptkbp:notable_for |
low memory usage
|
gptkbp:provides |
fast hashing
|
gptkbp:supports |
parallel processing
|