Results 101 to 110 of about 10,388,112 (269)
PARSHA-256 – A New Parallelizable Hash Function and a Multithreaded Implementation [PDF]
Pinakpani Pal, Palash Sarkar
openalex +1 more source
Hash Embeddings for Efficient Word Representations
We present hash embeddings, an efficient method for representing words in a continuous vector form. A hash embedding may be seen as an interpolation between a standard word embedding and a word embedding created using a random hash function (the hashing ...
Hansen, Jonas Meinertz+2 more
core
Refined repetitive sequence searches utilizing a fast hash function and cross species information retrievals [PDF]
Jeff Reneker, Chi‐Ren Shyu
openalex +1 more source
Bad Directions in Cryptographic Hash Functions
A 25-gigabyte “point obfuscation” challenge “using security parameter 60” was announced at the Crypto 2014 rump session; “point obfuscation” is another name for password hashing. This paper shows that the particular matrix-multiplication hash function used in the challenge is much less secure than previous password-hashing functions are believed to be.
Daniel J. Bernstein+4 more
openaire +4 more sources
Revocable policy-based chameleon hash using lattices
A chameleon hash function is a type of hash function that involves a trapdoor to help find collisions, i.e., it allows the rewriting of a message without modifying the hash.
Klamti Jean Belo, Hasan Mohammed Anwarul
doaj +1 more source
A Security Analysis of Double-Block-Length Hash Functions with the Rate 1 [PDF]
Shoichi Hirose
openalex +1 more source
Özet Fonksiyonları daha çok veri bütünlüğünde ve elektronik imza gibi kimlik doğrulamada kullanılan kriptolojinin en önemli araçlardan biridir. Bu fonksiyonlar, herhangi bir uzunluktaki girdiyi belli özelliklerle sıkıştırarak sabit bir uzunluktaki çıktıya götürler.
openaire +3 more sources
IP address lookup using a dynamic hash function [PDF]
Xiaojun Nie+4 more
openalex +1 more source