Results 101 to 110 of about 10,388,112 (269)

Hash Embeddings for Efficient Word Representations

open access: yes, 2017
We present hash embeddings, an efficient method for representing words in a continuous vector form. A hash embedding may be seen as an interpolation between a standard word embedding and a word embedding created using a random hash function (the hashing ...
Hansen, Jonas Meinertz   +2 more
core  

Bad Directions in Cryptographic Hash Functions

open access: yes, 2015
A 25-gigabyte “point obfuscation” challenge “using security parameter 60” was announced at the Crypto 2014 rump session; “point obfuscation” is another name for password hashing. This paper shows that the particular matrix-multiplication hash function used in the challenge is much less secure than previous password-hashing functions are believed to be.
Daniel J. Bernstein   +4 more
openaire   +4 more sources

Revocable policy-based chameleon hash using lattices

open access: yesJournal of Mathematical Cryptology
A chameleon hash function is a type of hash function that involves a trapdoor to help find collisions, i.e., it allows the rewriting of a message without modifying the hash.
Klamti Jean Belo, Hasan Mohammed Anwarul
doaj   +1 more source

Incremental hash functions

open access: yes, 2014
Özet Fonksiyonları daha çok veri bütünlüğünde ve elektronik imza gibi kimlik doğrulamada kullanılan kriptolojinin en önemli araçlardan biridir. Bu fonksiyonlar, herhangi bir uzunluktaki girdiyi belli özelliklerle sıkıştırarak sabit bir uzunluktaki çıktıya götürler.
openaire   +3 more sources

IP address lookup using a dynamic hash function [PDF]

open access: green, 2006
Xiaojun Nie   +4 more
openalex   +1 more source

Home - About - Disclaimer - Privacy