Results 11 to 20 of about 20,342 (243)

More Analysis of Double Hashing for Balanced Allocations [PDF]

open access: green2016 Proceedings of the Thirteenth Workshop on Analytic Algorithmics and Combinatorics (ANALCO), 2015
With double hashing, for a key $x$, one generates two hash values $f(x)$ and $g(x)$, and then uses combinations $(f(x) +i g(x)) \bmod n$ for $i=0,1,2,...$ to generate multiple hash values in the range $[0,n-1]$ from the initial two. For balanced allocations, keys are hashed into a hash table where each bucket can hold multiple keys, and each key is ...
Michael Mitzenmacher
core   +5 more sources

The Cost of Bitcoin Mining Has Never Really Increased [PDF]

open access: yesFrontiers in Blockchain, 2020
The Bitcoin network is burning a large amount of energy for mining. In this paper, we estimate the lower bound for the global mining energy cost for a period of 10 years from 2010 to 2020, taking into account changes in energy costs, improvements in ...
Yo-Der Song   +3 more
doaj   +4 more sources

Load Thresholds for Cuckoo Hashing with Double Hashing

open access: green16th Scandinavian Symposium and Workshops on Algorithm Theory (SWAT 2018), 2018
In k-ary cuckoo hashing, each of cn objects is associated with k random buckets in a hash table of size n. An l-orientation is an assignment of objects to associated buckets such that each bucket receives at most l objects. Several works have determined load thresholds c^* = c^*(k,l) for k-ary cuckoo hashing; that is, for c < c^* an l-orientation ...
Michael Mitzenmacher   +2 more
  +6 more sources

Improved Quantum Rebound Attacks on Double Block Length Hashing with Round-Reduced AES-256 and ARIA-256

open access: diamondIACR Transactions on Symmetric Cryptology
At EUROCRYPT 2020, Hosoyamada and Sasaki proposed the first dedicated quantum collision attacks on hash functions. Their proposal presented a quantum adaptation of the rebound attack and revealed that differential trails, which have too low probability ...
Dongjae Lee, Seokhie Hong
doaj   +3 more sources

Flexible Packet Matching with Single Double Cuckoo Hash

open access: greenIEEE Communications Magazine, 2017
In modern switches, a packet can go through a number of processing steps to determine, for example, if the packet has to be discarded due to security policies, if it needs to be marked for quality of service or to determine the next hop for the packet.
Gil Levy   +2 more
openalex   +4 more sources

Attacks on Fast Double Block Length Hash Functions [PDF]

open access: bronzeJournal of Cryptology, 1998
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Lars R. Knudsen   +2 more
openalex   +2 more sources

Another Glance at Double-Length Hashing

open access: gold, 2009
We propose a novel framework for blockcipher-based double-length hash functions by extending the recent generalization presented by Stam at FSE '09 for single-call hash functions. We focus on compression functions compressing 3n bits to 2n bits that use one or two calls to a 2n -bit key, n -bit block blockcipher.
Onur Özen, Martijn Stam
openalex   +3 more sources

Frequent Itemset Generation using Double Hashing Technique

open access: diamondProcedia Engineering, 2012
AbstractIn data mining, frequent itemsets plays an important role which is used to identify the correlations among the fields of database.In this paper, we propose a new association rule mining algorithm called Double Hashing Based Frequent Itemsets, (DHBFI) in which hashing technology is used to store the database in vertical data format.
N. Jayalakshmi   +3 more
openalex   +2 more sources

Remainder Quotient Double Hashing Technique in Closed Hashing Search Process

open access: greenSSRN Electronic Journal, 2019
Searching is one of the most important process in many activities to access the data or elements. It can be done both in online and offline mode. Many algorithms are used in data structure to perform search process. Hash search algorithm is one of them which are independent of the number of elements inserted into the table.
Stuti Pandey, Abhay Kumar Agarwal
openalex   +2 more sources

Augmenting integrity and scalability in mobile payment applications using blockchain [PDF]

open access: yesE3S Web of Conferences, 2021
The transactional information from the mobile wallets is offloaded from the mobile device to the mobile transaction server. The transaction involves various communication standards, confidential transaction information to ensure flawless transaction of ...
David Shibin   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy