Results 121 to 130 of about 20,415 (157)
Some of the next articles are maybe not open access.
Deep Double Center Hashing for Face Image Retrieval
2021Hashing is an effective and widely used technology for fast approximate nearest neighbor search in large-scale images. In recent years, it has been combined with a powerful feature learning model, convolutional neural network(CNN), to boost the efficiency of large-scale image retrieval. In this paper, we introduce a new Deep Double Center Hashing (DDCH)
Xin Fu, Wenzhong Wang, Jin Tang
openaire +1 more source
Collision Resistant Double-Length Hashing
2010We give collision resistance bounds for blockcipher based, double-call, double-length hash functions using (k, n)-bit blockciphers with k > n. Ozen and Stam recently proposed a framework [21] for such hash functions that use 3n-to-2n-bit compression functions and two parallel calls to two independent blockciphers with 2n-bit key and n-bit block size.
Ewan Fleischmann +3 more
openaire +1 more source
An Efficient, Hybrid, Double-Hash StringMatching Algorithm
2019 IEEE Long Island Systems, Applications and Technology Conference (LISAT), 2019In this paper we show that combining some of the good features of the existing popular algorithms can be even more efficient. This new algorithm is hybrid as it employs features from Boyer-Moore-Horspool, Rabin-Karp and Raita algorithms. We compare the right most character as well as use two independent hash functions and no character by character ...
Mehmet Bicer, Xiaowen Zhang
openaire +1 more source
External Double Hashing with Choice
8th International Symposium on Parallel Architectures,Algorithms and Networks (ISPAN'05), 2006A novel extension to external double hashing providing significant reduction to both successful and unsuccessful search lengths is presented. The experimental and analytical results demonstrate the reductions possible. This method does not restrict the hashing table configuration parameters and utilizes very little additional storage space per bucket ...
openaire +1 more source
Evolutionary double-pipe prefix-free hash function
Journal of Information and Optimization Sciences, 2020Recent works have presented collision attacks based on differentiability of classical hash functions. In this article a new hash function is proposed with enhanced Merkle-Damgard construction.
openaire +1 more source
Double hash function scheme in wireless sensor networks
2011 World Congress on Information and Communication Technologies, 2011Wireless sensor networks are a new class of distributed systems that are an integral part of the physical space they inhabit. Key distribution plays an important role in wireless sensor networks. In WSN, node capture attack is the most series attack. The aim of this paper is to improve the resistance against the node capture attack.
T.D. Subash, C. Divya
openaire +1 more source
Another Glance at Double-Length Hashing
2009We propose a novel framework for blockcipher-based double-length hash functions by extending the recent generalization presented by Stam at FSE '09 for single-call hash functions. We focus on compression functions compressing 3n bits to 2n bits that use one or two calls to a 2n -bit key, n -bit block blockcipher.
Onur Özen, Martijn Stam
openaire +1 more source
Flexible Packet Matching with Single Double Cuckoo Hash
IEEE Communications Magazine, 2017In modern switches, a packet can go through a number of processing steps to determine, for example, if the packet has to be discarded due to security policies, if it needs to be marked for quality of service or to determine the next hop for the packet.
Levy G, Pontarelli S, Reviriego P
openaire +2 more sources
Analysis of Double Block Length Hash Functions
2003The security of double block length hash functions and their compression functions is analyzed in this paper. First, the analysis of double block length hash functions by Satoh, Haga, and Kurosawa is investigated. The focus of this investigation is their analysis of the double block length hash functions with the rate 1 whose compression functions ...
Mitsuhiro Hattori +2 more
openaire +1 more source
Right Transfer Method Based on Double HASH Chain
Applied Mechanics and Materials, 2014This Paper analyzes security issues during the process of the right transfer, sums up the basic needs during the transfer and the defects of existing rights transfer, and puts forward the right transfer program based on double HASH chain, which achieves the transfer of the digital right under the control of HASH Distance and meta-rights.
Ping Zhu, Mu Yao Lu
openaire +1 more source

