Error Correcting Codes, Perfect Hashing Circuits, and Deterministic Dynamic Dictionaries
We consider dictionaries of size n over the finite universe U ={0, 1}^w and introduce a new technique for their implementation: error correcting codes. The use of such codes makes it possible to replace the use of strong forms of hashing, such as universal hashing, with much weaker forms, such as clustering.<br />We use our approach to construct,
openaire +2 more sources
A chaotic parallel hash engine with dynamic stochastic diffusion for blockchain and cloud security. [PDF]
Wang Q +5 more
europepmc +1 more source
ShockHash: Near Optimal-Space Minimal Perfect Hashing Beyond Brute-Force. [PDF]
Lehmann HP, Sanders P, Walzer S.
europepmc +1 more source
HashWave: blockchain-powered perceptual hashing for resilient audio piracy detection against signal-processing attacks in decentralized networks. [PDF]
Pandey S +3 more
europepmc +1 more source
An efficient image encryption scheme based on Lorenz system and quantum-inspired walks. [PDF]
Karmany M +4 more
europepmc +1 more source
Resilient cybersecurity in smart grid ICS communication using BLAKE3-driven dynamic key rotation and intrusion detection. [PDF]
Dokku NS +5 more
europepmc +1 more source
Anonymous and Efficient Chaotic Map-Based Authentication Protocol for Industrial Internet of Things. [PDF]
Zeng D +6 more
europepmc +1 more source
Semantic decentralized authentication for IoT-based e-learning using Hedera Hashgraph and Knowledge Graphs. [PDF]
Luo L, Zhang Y, Tang Q.
europepmc +1 more source
Securing e-governance against shadow attacks with blockchain technology. [PDF]
Mishra P, R G.
europepmc +1 more source
Scalable privacy-preserving data analytics for IoMT via FHE and zk-SNARK-enabled edge aggregation. [PDF]
Ben Othman S, Mihret N.
europepmc +1 more source

