Results 1 to 10 of about 20,307 (138)
Balanced Allocations and Double Hashing [PDF]
Double hashing has recently found more common usage in schemes that use multiple hash functions. In double hashing, for an item $x$, one generates two hash values $f(x)$ and $g(x)$, and then uses combinations $(f(x) +k g(x)) \bmod n$ for $k=0,1,2,...$ to
Alon N. +7 more
core +2 more sources
The Cost of Bitcoin Mining Has Never Really Increased [PDF]
The Bitcoin network is burning a large amount of energy for mining. In this paper, we estimate the lower bound for the global mining energy cost for a period of 10 years from 2010 to 2020, taking into account changes in energy costs, improvements in ...
Yo-Der Song +3 more
doaj +4 more sources
More Analysis of Double Hashing for Balanced Allocations [PDF]
With double hashing, for a key $x$, one generates two hash values $f(x)$ and $g(x)$, and then uses combinations $(f(x) +i g(x)) \bmod n$ for $i=0,1,2,...$ to generate multiple hash values in the range $[0,n-1]$ from the initial two.
Mitzenmacher, Michael
core +2 more sources
Quantum-inspired improved African vultures optimization algorithm for efficient placement of IoT service in edge computing environment [PDF]
The emergence of 5G networks has led to development of Edge Computing (EC) environments, which offer improved support for applications that rely on the Internet of Things (IoT).
B. Panjavarnam +3 more
doaj +2 more sources
Augmenting integrity and scalability in mobile payment applications using blockchain [PDF]
The transactional information from the mobile wallets is offloaded from the mobile device to the mobile transaction server. The transaction involves various communication standards, confidential transaction information to ensure flawless transaction of ...
David Shibin +3 more
doaj +1 more source
Securing Financial Transactions with a Robust Algorithm: Preventing Double-Spending Attacks
A zero-confirmation transaction is a transaction that has not yet been confirmed on the blockchain and is not yet part of the blockchain. The network propagates zero-confirmation transactions quickly, but they are not secured against double-spending ...
Hasan Hashim +5 more
doaj +1 more source
An Efficient Retrieval System Framework for Fabrics Based on Fine-Grained Similarity
In the context of “double carbon”, as a traditional high energy consumption industry, the textile industry is facing the severe challenges of energy saving and emission reduction.
Jun Xiang, Ruru Pan, Weidong Gao
doaj +1 more source
Quantum Free-Start Collision Attacks on Double Block Length Hashing with Round-Reduced AES-256
Recently, Hosoyamada and Sasaki (EUROCRYPT 2020), and Xiaoyang Dong et al. (ASIACRYPT 2020) proposed quantum collision attacks against AES-like hashing modes AES-MMO and AES-MP.
Amit Kumar Chauhan +2 more
doaj +1 more source
The paper objective is to determine the basic schemes and their characteristics for ensuring the security of Internet of Things nodes using symmetric authentication cryptographic microcircuits.
Petro Klimushin +3 more
doaj +1 more source
Groundwater overuse in different domains will eventually lead to global freshwater scarcity. To meet the anticipated demands, many governments worldwide are employing innovative and traditional techniques for forecasting groundwater availability by ...
Sukrutha L. T. Vangipuram +3 more
doaj +1 more source

