Results 301 to 310 of about 10,475,631 (365)
Some of the next articles are maybe not open access.

Learning to hash: forgiving hash functions and applications

Data Mining and Knowledge Discovery, 2008
The problem of efficiently finding similar items in a large corpus of high-dimensional data points arises in many real-world tasks, such as music, image, and video retrieval. Beyond the scaling difficulties that arise with lookups in large data sets, the complexity in these domains is exacerbated by an imprecise definition of similarity. In this paper,
Shumeet Baluja, Michele Covell
openaire   +2 more sources

Poseidon2: A Faster Version of the Poseidon Hash Function

IACR Cryptology ePrint Archive, 2023
Lorenzo Grassi   +2 more
semanticscholar   +1 more source

Heuristic Hash Functions

2019
The main topic of this book is implementing hash tables; it’s only secondarily about hash functions. This is why you have assumed a priori that you have uniformly distributed hash keys. In reality, this is unlikely to be the case; real data are rarely random samples from the space of possible data values.
openaire   +2 more sources

Keyed hash functions

1996
We give a new definition of keyed hash functions and show its relation with strongly universal hash functions and Cartesian authentication codes. We propose an algorithm for a secure keyed hash function and present preliminary result on its performance. The algorithm can be used for fast (about twice the speed of MD5) and secure message authentication.
Shahram Bakhtiari   +2 more
openaire   +2 more sources

XOR-Based Hash Functions

IEEE Transactions on Computers, 2005
Bank conflicts can severely reduce the bandwidth of an interleaved multibank memory and conflict misses increase the miss rate of a cache or a predictor. Both occurrences are manifestations of the same problem: objects, which should be mapped to different indices, are accidentally mapped to the same index.
Vandierendonck, Hans, De Bosschere, K.
openaire   +2 more sources

Brute force attacks on hash functions

Journal of Discrete Mathematical Sciences and Cryptography, 2007
We examine preimage, second preimage and collision resistance of cryptoghraphic hash functions for a particular class of brute force attacks.
LACCETTI, GIULIANO, G. Schmid
openaire   +5 more sources

Hash Function

Modern Cryptography with Proof Techniques and Applications, 2021
S. Hwang, Intae Kim, W. Lee
semanticscholar   +1 more source

Hash functions and Cayley graphs

Designs, Codes and Cryptography, 1994
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
openaire   +3 more sources

Cryptographic hash functions

European Transactions on Telecommunications, 1994
AbstractHash functions were introduced in cryptology in the late seventies as a tool to protect the authenticity of information. Soon it became clear that they were a very useful building block to solve other security problems in telecommunication and computer networks.
openaire   +2 more sources

Home - About - Disclaimer - Privacy